Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

What to know about 5G security threats in the enterprise

Cyberinchief by Cyberinchief
October 1, 2025
Reading Time: 3 mins read
0
What to know about 5G security threats in the enterprise


Many organizations increasingly rely on 5G technologies for mobile communications, making any 5G security weaknesses of interest to attackers. The good news is that 5G standards have significantly improved cybersecurity for mobile communications overall. Even so, threat actors inevitably still target 5G devices, networks and services.

While mobile network operators are responsible for countering many of these threats through their own security controls, organizations that use 5G services should still consider how bad actors could use the technology against them. What follows are my top insights on 5G security threats for enterprise CISOs, based on a series of 5G cybersecurity white papers I co-authored for NIST’s National Cybersecurity Center of Excellence.  

Top 5G security threats

Major 5G cybersecurity threats tend to fall into the following three categories: threats against 5G services and infrastructure, attacks against 5G devices and unavailability of 5G networks.

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

1. Threats against 5G services and infrastructure

Mobile network operators follow 5G standards in their implementations, but those standards do not require operators to implement or enforce all defined cybersecurity features. Attackers might take advantage of resulting gaps to target devices using 5G services.

For example, attackers might use 5G to spy on users’ geographic locations. Each 5G user, or “subscriber,” is assigned a unique subscription permanent identifier (SUPI). Some 5G implementations transmit unprotected SUPIs, which can enable eavesdroppers to track those subscribers’ physical whereabouts.

2. Attacks against 5G devices

Typically, 5G devices are always connected to mobile networks — often while simultaneously connected to other types of networks, such as Wi-Fi and Bluetooth. This significantly increases the attack surfaces of these devices, providing more ways for attackers to access and compromise them.

Also, 5G devices often aren’t protected by enterprise security controls to the same extent as other endpoints, making threats harder to detect and stop.

3. Unavailability of 5G networks

Much of the cybersecurity of 5G devices and their communications relies on protections built into 5G standards. In the event a 5G network isn’t available, a 5G device will automatically step down to use a 4G network — in the process, losing 5G safeguards.

Attackers can take advantage of this vulnerability by performing downgrade attacks that force or trick 5G devices to use 4G networks, resulting in predictable loss of protection.

Buy JNews
ADVERTISEMENT

How to defend against these threats

In any cybersecurity architecture, it’s best to rely on layers of defense so a weakness in one layer can be offset by other layers. Consider, for example, the following suggestions.

Engage mobile network operators regarding their 5G security practices

  • Ask your organization’s mobile network operator what 5G cybersecurity features their services and infrastructures support or mandate.
  • Specify in agreements the features your organization requires. Learn what aspects of these features, if any, are your organization’s responsibility to enable or maintain, and make sure you address any discrepancies.
  • One tactic to consider: Tell your network operator to enable subscription concealed identifier (SUCI) capabilities on its network and on the SIMs of your 5G devices. Then use SUCI in place of SUPI to prevent subscriber location tracking.

Use enterprise mobile security technologies to protect 5G devices

A wide variety of mobile security tools and services can secure, manage and monitor enterprise 5G devices. By deploying and using these technologies strategically, cybersecurity teams can reduce the risk of compromise and detect threats more quickly. 

Implement a strategy for handling 5G network unavailability

When it comes to managing 5G network unavailability and associated risks, the appropriate strategy for any organization, or group of devices within an organization, depends on many business and risk factors. Basic policy options include the following:

  1. Enterprise 5G devices must use only 5G networks because of the additional cybersecurity features those networks provide.
  2. Enterprise 5G devices can use non-5G networks if the devices have additional cybersecurity controls to compensate for the loss of 5G network features.
  3. Enterprise 5G devices don’t need 5G networks’ cybersecurity features to achieve sufficient protection, so it’s OK for them to use non-5G networks when necessary.

Karen Scarfone is a general cybersecurity expert who helps organizations communicate their technical information through written content. She co-authored the Cybersecurity Framework (CSF) 2.0 and was formerly a senior computer scientist for NIST.



Source link

Tags: enterpriseSecuritythreats
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
iOS 26 Security & Privacy Features Explained: Essential Insights for Developers and Users

iOS 26 Security & Privacy Features Explained: Essential Insights for Developers and Users

Boards & NIS2 Directive: Strengthening Cybersecurity Governance

Boards & NIS2 Directive: Strengthening Cybersecurity Governance

Recommended Stories

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

October 31, 2025
Amount put on hold by cyber crime |  Cyber Crime Portal Amount Put on Hold | Amount Put on Hold MSG

Amount put on hold by cyber crime | Cyber Crime Portal Amount Put on Hold | Amount Put on Hold MSG

October 18, 2025
Top 5 Tech Careers ranked | AI, Cloud, Full Stack & Cybersecurity  #shorts  #ai #cloud

Top 5 Tech Careers ranked | AI, Cloud, Full Stack & Cybersecurity #shorts #ai #cloud

November 29, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested