{"id":544,"date":"2021-03-25T08:37:08","date_gmt":"2021-03-25T08:37:08","guid":{"rendered":"http:\/\/www.blueshell.im\/Blog\/?p=544"},"modified":"2021-03-25T08:37:39","modified_gmt":"2021-03-25T08:37:39","slug":"new-security-alert-for-5g-networks","status":"publish","type":"post","link":"http:\/\/www.blueshell.im\/Blog\/?p=544","title":{"rendered":"New Security Alert for 5G networks"},"content":{"rendered":"\n<p>Although at present the risk is small given the amount of remote home  usage for firms and implementation of 5G to satisfy this and cut costs for Emergency Services Radio networks this announcements of concern.<\/p>\n\n\n\n<p>5G network slicing vulnerability leaves enterprises exposed to cyberattacks<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-help-net-security wp-block-embed-help-net-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"oe8QT00ni3\"><a href=\"https:\/\/www.helpnetsecurity.com\/2021\/03\/24\/5g-network-slicing-vulnerability\/\">5G network slicing vulnerability leaves enterprises exposed to cyberattacks<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;5G network slicing vulnerability leaves enterprises exposed to cyberattacks&#8221; &#8212; Help Net Security\" src=\"https:\/\/www.helpnetsecurity.com\/2021\/03\/24\/5g-network-slicing-vulnerability\/embed\/#?secret=oe8QT00ni3\" data-secret=\"oe8QT00ni3\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Although at present the risk is small given the amount of remote home usage for firms and implementation of 5G to satisfy this and cut costs for Emergency Services Radio networks this announcements of concern. 5G network slicing vulnerability leaves &hellip; <a href=\"http:\/\/www.blueshell.im\/Blog\/?p=544\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/544"}],"collection":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=544"}],"version-history":[{"count":1,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/544\/revisions"}],"predecessor-version":[{"id":545,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/544\/revisions\/545"}],"wp:attachment":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=544"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}