• About
  • Advertise
  • Careers
  • Contact
Buy us coffee
Thursday, October 23, 2025
  • Login
No Result
View All Result
NEWSLETTER
Security News Hub
  • Home
  • World
  • Politics
  • Business
  • Fact-Check
  • Tech

    Trending Tags

    • Sillicon Valley
    • Climate Change
    • Election Results
    • Flat Earth
    • Golden Globes
    • MotoGP 2017
    • Mr. Robot
  • Infotainment

    How Jennifer Aniston ‘Struggles With Depression’ Inspired New Album

    20+ Pics That Prove Jennifer Is a Timeless Beauty

    Hidden Ways To Save Money That You Might Be Missing

    The Best Street Style From Paris Fashion Week Spring

    Fashionable Summer Accessories to Dress Up Your Travel Look

    Business Casual: The Definitive Guide for Women To Be Stylish At Work

  • Lifestyle
    • All
    • Travel

    BREAKING NEW: I WANT TO BE THE NEXT NIGERIAN PRESIDENT BY 2023 – PETER OBI

    How Fashion Insiders Are Dressing for New York Fashion Week

    How Fashion Insiders Are Dressing for New York Fashion Week

    18 Top Fall Fashion Trends from New York Fashion

    Medicaid Expansion Improves Hypertension and Diabetes Control

    10 Places You Can’t Miss If It’s Your First Time in European

    Long-Term Care Needs Among Retirees Varies Widely, New Research Shows

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
  • Home
  • World
  • Politics
  • Business
  • Fact-Check
  • Tech

    Trending Tags

    • Sillicon Valley
    • Climate Change
    • Election Results
    • Flat Earth
    • Golden Globes
    • MotoGP 2017
    • Mr. Robot
  • Infotainment

    How Jennifer Aniston ‘Struggles With Depression’ Inspired New Album

    20+ Pics That Prove Jennifer Is a Timeless Beauty

    Hidden Ways To Save Money That You Might Be Missing

    The Best Street Style From Paris Fashion Week Spring

    Fashionable Summer Accessories to Dress Up Your Travel Look

    Business Casual: The Definitive Guide for Women To Be Stylish At Work

  • Lifestyle
    • All
    • Travel

    BREAKING NEW: I WANT TO BE THE NEXT NIGERIAN PRESIDENT BY 2023 – PETER OBI

    How Fashion Insiders Are Dressing for New York Fashion Week

    How Fashion Insiders Are Dressing for New York Fashion Week

    18 Top Fall Fashion Trends from New York Fashion

    Medicaid Expansion Improves Hypertension and Diabetes Control

    10 Places You Can’t Miss If It’s Your First Time in European

    Long-Term Care Needs Among Retirees Varies Widely, New Research Shows

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Security News Hub
No Result
View All Result
Home Cyber space

NSA WARNS OF THREAT ACTORS COMPROMISING ENTIRE 5G NETWORKS VIA CLOUD SYSTEMS

by Admin
October 28, 2021
in Cyber space
0 0
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

The US National Security Agency has published a security advisory today warning about how attackers could compromise entire 5G networks by hijacking a provider’s cloud resources.

The NSA advisory, published together with experts from the US Cybersecurity Infrastructure and Security Agency, is part one of a four-part series the agency plans to publish on 5G security.

The series contains extensive guidance for preventing and dealing with cyberattacks on 5G infrastructure and builds on a previous guide [PDF] the two agencies published in May.

According to the NSA, part one contains “recommendations for mitigating lateral movement attempts by malicious cyber actors who have successfully exploited a vulnerability to gain initial access into a 5G cloud system.”

The NSA is hoping that US telecommunications providers involved in the 5G rollout will follow these practices and avoid their 5G infrastructure being compromised by foreign actors.

Besides the potential of attacks on the cloud infrastructure that holds 5G networks together, the guide also lists possible threats to the US 5G networks, such as:

  • Counterfeit components – more susceptible to cyber-attack and are more likely to break because of their poor quality. They can also be backdoored.
  • Inherited components – compromised or weakly-secured components might end up on US 5G networks via complex supply chains, which will need to be investigated.
  • Open standards – adversarial nations may contribute to open standards to request the inclusion of proprietary or untrusted technologies.
  • Optional controls – standards may come with optional security controls that some network operators may not be willing to use.
  • Software/configurations – which refers to vulnerabilities in 5G equipment that may be exploited by attackers to compromise equipment and their configurations.
  • Network security – attacks on network equipment could allow threat actors to access 5G infrastructure.
  • Network slicing – the ability of network operators to split their 5G networks into zones, depending on the type of connected devices. Threat actors could break through these zones and access critical infrastructure.
  • Legacy communications integrations – vulnerabilities in legacy protocols could be used by threat actors to access 5G infrastructure.
  • Spectrum sharing – may provide opportunities for malicious actors to jam or interfere with non-critical communication paths, adversely affecting more critical communications networks.

The NSA said the rest of its 5G security guidance papers would be published in the coming weeks — on this page.

“This series exemplifies the national security benefits resulting from the joint efforts of Enduring Security Framework (ESF) experts from CISA, NSA, and industry,” said Rob Joyce, NSA Cybersecurity Director.

“Service providers and system integrators that build and configure 5G cloud infrastructures who apply this guidance will do their part to improve cybersecurity for our nation.”

The CEO TalonGeeks Limited a Cyber Security Company based in Nigeria also tweet earlier this month during the #CybersecurityAwarenessMonth raising observation of what could happen if AWS user account get compromised.

Imagine a ransomware attack on AWS architecture. Off course it’s no more a matter of if it can happen but when!! That will be the greatest cyber heist of the century. #cybersecurity #CybersecurityAwarenessMonth

— TalonGeeks (@TalonGeeks) October 12, 2021

 

Tags: cybersecurityCybersecurityAwarenessMonthTalonGeeks
Admin

Admin

Recommended

The Best Street Style From Paris Fashion Week Spring

4 years ago

Nigerian Army Women’s Corps Task to Enhance Synergy Through Inter-Agency Collaboration

3 years ago

Popular News

Plugin Install : Popular Post Widget need JNews - View Counter to be installed

Connect with us

Defence & Security New Hub

Security News Hub

We are Africa's First Independent Defence and Security News Hub that provides you with the latest, exclusive and data-driven analytical news within the Defence community
SUBSCRIBE

Recent posts

  • FACT CHECK: Viral Video Claiming ISWAP Has Entered Kogi State Is Not From Nigeria
  • Sanwo-Olu, Wike, Uzodimma, Buratai Among Witnesses Listed by Nnamdi Kanu in Terrorism Trial
  • Study Reveals That One in Every Five Nigerians Is Mentally Unstable
  • Army Loses Commanding Officer, Others as Troops Foil Terrorist Attack in Borno
  • Nigeria Police Fire Tear Gas and Arrest Dozens as Protesters Demand Release of Separatist Leader

Nigerian President Bola Ahmed Tinubu has approved the finalization of a new $1 billion deal to boost the Nigeria's defense industry. The deal, which was signed with the Managing Arm of the Military-Industrial Complex of the Indian government, will see the Defense Industries… pic.twitter.com/ep4LgoIS4c

— DefenceTimesNG (@DefenceTimesNG1) September 8, 2023
  • About
  • Advertise
  • Careers
  • Contact

© 2025 DefenceTimesNG - Proudly designed with love from DefenceTimesNG

No Result
View All Result
  • Home
  • Politics
  • World
  • Business
  • Science
  • National
  • Entertainment
  • Lifestyle
  • Travel
  • Tech

© 2025 DefenceTimesNG - Proudly designed with love from DefenceTimesNG

Welcome Back!

OR

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist