Third-Party
Industry Collaboration & Standards
Mobile Threat Intelligence Framework (MoTIF) Principles Version 1.0
MoTIF a first version of a framework for describing how adversaries attack and use mobile networks, based on the TTPs they use (published April 2024) View MoTIF
The GSMA’s ‘MoTIF’ – what it is and how it was established
GSMA MOTIF Chair, Enea AB’s Cathal McDaid, explains what the Mobile Threat Intelligence Framework (MOTIF) is and why it’s needed (April 2024). View the Blog
The EU’s Cyber Resilience Act: Requirements Standards Mapping
This ENISA study maps the most relevant among existing cybersecurity standards to each of the requirements of the EU’s Cyber Resilience Act as well as highlights possible gaps to be addressed. (published 2024). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2024”
GSMA’s “Mobile Telecommunications Security Landscape 2024” (published February 2024). View the Report
Palo Alto Networks Unit 42 Incident Response Report
In the past year, attackers’ initial access most often started with a software vulnerability. The largest attack campaigns began with successful exploitation of internet-facing systems. From there, the stories varied (published 2024). View the Report
The 2023 Impact Report
More than two dozen open-source threat intelligence R&D projects from the brilliant Mitre Engenuity’s Centre for Threat Informed Defense for organizations to adopt as their own (Published February 24). View the Report
Post Quantum Guidelines for Telecom Use Cases
The GSMA-backed task force has published ‘Post Quantum Guidelines for Telecom Use Cases’ (published February 2024). View the Report
Dragos’ 2023 OT Cybersecurity Year in Review
Dragos’ 2023 OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches (published February 2024).View the Report
The ORAN Alliance Security Working Group (WG 11) February 2024 report
During 2023 O-RAN security specifications were enhanced with new requirements and controls to bring O-RAN closer to a zero trust architecture. (Published Feb 2024) View the Report
Cyber Threat Alliance In Focus
CTA’s role as an intelligence sharing organization is to enable relevant information to move across the boundaries that exists between cybersecurity providers (Published December 2023) View the Report
NGMN’s “6G Trustworthiness Considerations” Paper
NGMN has identified several technology trends that will influence the trustworthiness of a 6G network including network AI, open source, virtualisation and containerization, and quantum computing which might bring new security threats (Published October 2023). View the Report
