Workflow
Deepfield
icon
Search documents
Critical networks face stealthy intrusions, record-breaking DDoS attacks and rising cryptographic demands, according to Nokia study
Globenewswire· 2025-10-08 07:30
Core Insights - Cyber attackers are increasingly penetrating core telecom infrastructure undetected, with DDoS attacks reaching record levels and the need for crypto agility becoming essential [1][2][4] Group 1: Cybersecurity Threats - Attackers are targeting core networks, accessing sensitive systems like subscriber data and lawful interception platforms, often using trusted tools and exploiting misconfigurations [2][6] - DDoS attacks have surged to terabit-scale, occurring daily, with gigabit residential broadband amplifying the risks [3][6] - Nearly 60% of high-cost breaches are attributed to insider actions or human errors, with complex supply chains increasing vulnerabilities [5][6] Group 2: Defense Strategies - Over 70% of telecom security leaders prioritize AI and machine learning for threat analytics, with more than half planning to implement AI for detection within 18 months [4][6] - The industry is urged to adopt automated certificate management and encryption to prepare for quantum computing threats [4][8] - DDoS attack durations are decreasing, with 78% now concluding within five minutes, highlighting the need for rapid detection and mitigation [7][6] Group 3: Industry Response - The report emphasizes the importance of shared threat intelligence, AI-driven detection, and crypto-agility to enhance resilience in interconnected networks [9] - Network owners must proactively protect against complex DDoS attacks, integrating security measures into the network infrastructure [10] - The urgency for compliance with upcoming regulations is low, despite the shrinking validity of digital certificates [8]
Critical networks face stealthy intrusions, record-breaking DDoS attacks and rising cryptographic demands, according to Nokia study
Globenewswire· 2025-10-08 07:30
Core Insights - Cyber attackers are increasingly penetrating core telecom infrastructure undetected, with DDoS attacks reaching new extremes and the need for crypto agility becoming a requirement [1][2][4] Cybersecurity Threats - Attackers are targeting core networks, accessing sensitive systems like subscriber data and lawful interception platforms, often using trusted tools and exploiting misconfigurations [2][6] - Nearly 60% of high-cost breaches are attributed to insider actions or human errors, with complex supply chains increasing exposure to credential misuse and privilege escalation [5][6] DDoS Attack Trends - Terabit-scale DDoS attacks are now occurring daily, a significant increase from once every five days in 2024, with residential broadband amplifying the risks [3][6] - 78% of DDoS attacks now conclude within five minutes, up from 44% in 2024, indicating a need for rapid detection and mitigation strategies [7][6] AI and Quantum Readiness - Over 70% of telecom security leaders prioritize AI and machine learning for threat analytics, with more than half planning to implement AI for detection within 18 months [4][6] - The validity period for digital certificates is decreasing significantly, projected to drop to 47 days by 2029, highlighting the urgency for compliance and quantum-safe networking [8] Industry Response and Recommendations - The industry must enhance resilience through shared threat intelligence, AI-driven detection, and crypto agility to combat the evolving cyber threats [9][10] - Security measures should be integrated into network design to ensure uninterrupted critical functions amid rising DDoS threats [10]