Nokia414 тыс
Следующее
Опубликовано 7 января 2026, 12:23
Defending critical networks against AI-driven cyberattacks – Nora Farkas (Nokia)
Recent telecom breaches reveal how attackers exploit weak authentication, insecure APIs, and stealthy backdoors to gain persistent, undetected access to critical infrastructure. These intrusions, lasting months or even years, compromise lawful intercept systems, subscriber data, and cloud-native environments, with far-reaching impacts on security and trust. Today, adversaries accelerate their operations using AI-powered tools like LLM-generated phishing, automated credential spraying, and model poisoning. These innovations often outpace legacy defenses and evade static detection methods.
Recent telecom breaches reveal how attackers exploit weak authentication, insecure APIs, and stealthy backdoors to gain persistent, undetected access to critical infrastructure. These intrusions, lasting months or even years, compromise lawful intercept systems, subscriber data, and cloud-native environments, with far-reaching impacts on security and trust. Today, adversaries accelerate their operations using AI-powered tools like LLM-generated phishing, automated credential spraying, and model poisoning. These innovations often outpace legacy defenses and evade static detection methods.






















