Third-Party
Industry Collaboration & Standards
SSSCIP of Ukraine: “Russian Cyber Operations: Analytics for 1H 2025”
On March 23, 2025, the news was dominated by reports of a significant cyberattack on Ukrainian Railways. However, this was not the only cyberattack carried out by UAC-0002 (Sandworm) in the first half of 2025. (published October 2025). View the Report
CISA’s Advisory on “Countering Chinese State-Sponsored Actors”
CISA and partner cybersecurity agency guidance on defending against People’s Republic of China state-sponsored cyber threat actors targeting telecom, government, transportation, lodging, & military infrastructure networks globally (published September 2025). View the Guidance
Interpol’s “Africa Cyber Threat Assessment Report 2025”
Interpol’s report outlines the core cybercrime challenges facing Africa, emerging threat trends, and real-world examples of both systemic barriers and operational success (published June 2025). View the report
5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks
CTIA’s 5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks (published September 2025). View the report
Quantum-safe Cryptography for 4G and 5G Roaming
The GSMA Post Quantum Telco Network Task Force’s new use case: “Quantum-safe Cryptography for 4G and 5G Roaming” (published August 2025). View the Report
ATIS: “Enhanced 5G and Zero Trust Cloud and Operational Security”
ATIS’ White Paper on the implementation and operational aspects of implementing a zero trust architecture in the various cloud environments that are hosting 5G services (published August 2025). View the White Paper
Palo Alto Networks: “Threats from AI Agents”
“AI Agents Are Here. So Are the Threats.” A new report from Palo Alto Networks’ Unit 42 threat research team (published May 2025). View the Report.
Verizon’s 2025 Data Breach Investigations Report (DBIR)
This year Verizon’s DBIR shows of breaches were linked to third-party involvement, twice as much as last year (published April 2025). View the Report
GSMA’s “Mobile Device Theft – State of Affairs”
The need for better collaborative intelligence sharing of information on the techniques and tactics employed by criminals is one of the take-aways from this new GSMA report (published February 2025). View the Report
Dragos OT/ICS Cybersecurity Report 2025
Dragos’ 2025 OT/ICS Cybersecurity report provides detailed breakdowns of major incidents, including how adversaries gained access and executed attacks against industrial control systems (published February 2025).View the Report
Palo Alto Networks Unit 42’s “2025 Incident Response Report”
n 2024, the Unit 42 IR team responded to over 500 cyberattacks, 86% of which caused direct business impact. Threat actors increasingly targeted multiple attack surfaces, leveraging Gen AI and advanced cloud tactics. (published February 2025) View the Report.
GSMA’s “Mobile Telecommunications Security Landscape 2025”
GSMA’s seventh annual Mobile Telecommunications Security Landscape report 2025 (published February 2025). View the Report
