sfba.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for the San Francisco Bay Area. Come on in and join us!

Server stats:

2.3K
active users

#telecom

4 posts4 participants1 post today

Here's @KarlBode with a very informative piece on the #FCC under chairman and censor-in-chief Brendan Carr as he approaches his first 100 days and it's a great takedown and bashing as you can expect from Karl.

He's anti-consumer, pro-censorship, very pro-telecom (mostly towards Starlink), human rights-killer and more.

theverge.com/tech/656653/brend

Hand puppeting the satellites on the FCC seal surrounded by falling dollar bills.
The Verge · Brendan Carr’s FCC is an anti-consumer, rights-trampling harassment machineBy Karl Bode
Continued thread

one of my favourite stories from this book that I learnt only now:

there was a lawsuit filed by Cisco against Huawei in 2000s for stealing intellectual property - and part of the evidence was that Huawei copied Cisco's router software... including even the same bugs - which Huawei didn't bother to fix 🙃

#Huawei#Cisco#Tech

Why nation-states are so interested in Telcos? - Sygnia

TLDR: Information and Control

Nation-state actors like China are increasingly targeting telecom providers across the globe. Discover why Telcos are high-value targets and why these cyberattacks should concern the public.

sygnia.co/blog/nation-states-i

Sygnia · Why Nation-States Target Telecoms: Understanding the Growing ThreatNation-state actors like China are increasingly targeting telecom providers across the globe. Discover why Telcos are high-value targets and why these cyberattacks should concern the public.

Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Introduces New Banking Phishing Kit

The Chinese eCrime group Smishing Triad has launched a global SMS phishing campaign targeting over 121 countries across various industries. Their infrastructure generates over one million page visits in 20 days, averaging 50,000 daily. The group has introduced a new 'Lighthouse' phishing kit focusing on banking and financial organizations, particularly in Australia and the Asia-Pacific region. Smishing Triad claims to have '300+ front desk staff worldwide' supporting their operations. They frequently rotate domains, with approximately 25,000 active during any 8-day period. The majority of phishing sites are hosted by Chinese companies Tencent and Alibaba. The campaign primarily targets postal, logistics, telecommunications, transportation, finance, retail, and public sectors.

Pulse ID: 67f80a4937d04f9036252cf7
Pulse Link: otx.alienvault.com/pulse/67f80
Pulse Author: AlienVault
Created: 2025-04-10 18:13:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#Asia#Australia#Bank

I've had a account that I'll hardly used for YEARS & just received a notice from that they are "retiring" it & transitioning Skype subscribers to , whatever that is.🤷‍♂️

Since I'm not a , I'm not going to make the transition but I've got a $9.09 credit that I've got to use before they retire it.

-------------------------------------

Dear Skype user,
In order to streamline our free consumer communications offerings, we will be retiring Skype on May 5, 2025to focus on Microsoft Teams, our modern communications and collaboration hub.

Teams helps people stay connected and engaged at work and at home. Teams users have access to many of the same core features as Skype, including 1:1 calls, group calls, messaging, and file sharing. Additionally, Teams offers enhanced features like hosting meetings, managing calendars, and building and joining communities—all for free.

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

The Lotus Blossom espionage group has been conducting cyber espionage campaigns targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan. The group employs various versions of the Sagerunex backdoor, including new variants that use cloud services like Dropbox, Twitter, and Zimbra for command and control. Lotus Blossom utilizes multiple hacking tools and techniques to maintain long-term persistence in compromised networks. The attacks involve multi-stage operations, including reconnaissance, lateral movement, and data exfiltration. The group has been active since at least 2012 and continues to evolve its tactics and malware to evade detection.

Pulse ID: 67f038f22c3d7acc43c35cb7
Pulse Link: otx.alienvault.com/pulse/67f03
Pulse Author: AlienVault
Created: 2025-04-04 19:54:26

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.