Third-Party
5G & 6G Security
Nokia’s Threat Intelligence Report 2025
Nokia’s 2025 threat report shows how stealth intrusions are reaching the telecom core, DDoS floods are hitting multi‑terabit peaks within minutes, and cryptography requirements are accelerating. (Published October 2025). View the Report
Interpol’s “Africa Cyber Threat Assessment Report 2025”
Interpol’s report outlines the core cybercrime challenges facing Africa, emerging threat trends, and real-world examples of both systemic barriers and operational success (published June 2025). View the report
5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks
CTIA’s 5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks (published September 2025). View the report
ATIS: “Enhanced 5G and Zero Trust Cloud and Operational Security”
ATIS’ White Paper on the implementation and operational aspects of implementing a zero trust architecture in the various cloud environments that are hosting 5G services (published August 2025). View the White Paper
GSMA’s “Mobile Device Theft – State of Affairs”
The need for better collaborative intelligence sharing of information on the techniques and tactics employed by criminals is one of the take-aways from this new GSMA report (published February 2025). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2025”
GSMA’s seventh annual Mobile Telecommunications Security Landscape report 2025 (published February 2025). View the Report
Zimperium’s Global Mobile Threat Report 2024
70% of businesses fail to adequately secure personal devices used for work, reinforcing the belief held by 55% of professionals that smartphones are the most exposed endpoints in their organization according to Zimperium’s new report (Published October 2024). View the Report
Nokia’s Threat Intelligence Report 2024
Nokia’s 2024 threat report shows that the number and frequency of DDoS attacks has grown from one or two a day to well over 100 per day in many networks (Published October 2024). View the Report
The Communications Sector Coordination Council Annual Report 2024
The annual report highlighting the work of the CSCC and its inputs into the other private and public sector bodies charged with defending America’s critical infrastructure against cyber and other threats (published 2024). View the Document
GSMA Key Management Version 7.0
This document outlines procedures for GSMA members and eligible non-members to exchange certificates and key material to facilitate use cases that rely on public key cryptographic algorithms. (published September2024). View the Document
The Allot H1 2024 Cyber Threat Report
The most prevalent cyber threats Allot is seeing targeting mobile and fixed internet users, categorized into browser-related threats, malicious links and sites, and remote-control threats (published August 2024). View the report
The GSMA’s ‘IoT Security Guidelines – April 2024’
The GSMA’s ‘IoT Security Guidellines’ promote best practice for the secure design, development and deployment of hashtag#IoT services, and provide a mechanism to evaluate security measures (April 2024). View the Guidelines
