Third-Party
Telecom Security
“Uncovering Global Telecom Exploitation by Covert Surveillance Actors”
This Citizen Lab investigation uncovers two sophisticated telecom surveillance campaigns and, for the first time, links real-world attack traffic to mobile operator signalling infrastructure. (published April 2026). View the Report
The European Telecommunications ISAC’s ‘Telco Security Landscape 2026’
“The threat of intentional disruption by both logical and physical means is on the rise. There is is a clear and urgent need for joint resilience planning across sectors and supply chains,” according to the European Telecommunications ISAC (published April 2026). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2026”
GSMA’s eighth annual Mobile Telecommunications Security Landscape report 2026 (published February 2026). View the Report
Nokia’s Threat Intelligence Report 2025
Nokia’s 2025 threat report shows how stealth intrusions are reaching the telecom core, DDoS floods are hitting multi‑terabit peaks within minutes, and cryptography requirements are accelerating. (Published October 2025). View the Report
ENISA’s “Threat Landscape 2025”
This latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025 (published October 2025). View the Report
Hiya’s ‘State of The Call 2025’
Hiya’s State of the Call report showcases trends and insights about the voice call market and the extent of its vulnerability to fraud. (Published September 2025).View the Report
CISA’s Advisory on “Countering Chinese State-Sponsored Actors”
CISA and partner cybersecurity agency guidance on defending against People’s Republic of China state-sponsored cyber threat actors targeting telecom, government, transportation, lodging, & military infrastructure networks globally (published September 2025). View the Guidance
Interpol’s “Africa Cyber Threat Assessment Report 2025”
Interpol’s report outlines the core cybercrime challenges facing Africa, emerging threat trends, and real-world examples of both systemic barriers and operational success (published June 2025). View the report
5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks
CTIA’s 5G Security Test Bed’s Assessment of 5G Network Resiliency against False Base Station Attacks (published September 2025). View the report
Quantum-safe Cryptography for 4G and 5G Roaming
The GSMA Post Quantum Telco Network Task Force’s new use case: “Quantum-safe Cryptography for 4G and 5G Roaming” (published August 2025). View the Report
Netscout’s 1H 2025 DDoS Threat Intelligence report
“”The first half of 2025 recorded 8.1 million DDoS attacks globally, with EMEA bearing the heaviest burden at 3.2 million.” (published August 2025). View the Report
ATIS: “Enhanced 5G and Zero Trust Cloud and Operational Security”
ATIS’ White Paper on the implementation and operational aspects of implementing a zero trust architecture in the various cloud environments that are hosting 5G services (published August 2025). View the White Paper
