From surveillance threats to crumbling infrastructure, mobile security continues to dominate headlines. Here’s a quick roundup of what’s happening across the telecom landscape—and what Cape has been up to lately.
In the News
Legacy communications are overdue for an upgrade
In a recent Washington Post op-ed, columnist David Ignatius calls out the federal government’s reliance on outdated and vulnerable communication tools. His piece highlights the urgent need for more secure alternatives—and features Cape as one of the companies stepping up to fill that void.
Criminals selling access to global telecom vulnerabilities
Reports are circulating that cybercriminals are offering SS7 (Signaling System 7) vulnerability data for $5,000 a pop. SS7 is the protocol that underpins global telecom signaling—and it’s notoriously flawed. These exploits could allow attackers to intercept calls, track locations, or compromise two-factor authentication for millions of users around the world.
FBI offers $10M bounty for China-backed telecom hackers
In a rare move, the U.S. State Department has offered a $10 million reward for information on Salt Typhoon (also known as APT41), a state-sponsored Chinese hacking group accused of infiltrating telecom networks. The bounty underscores the geopolitical stakes of telecom security—and the value of safeguarding core network infrastructure.
Cape in Conversation
Cape CEO John Doyle recently joined Adam Judelson on The Emergent Podcast to talk about what sets Cape apart from legacy telcos—and why the entire industry needs to rethink its security priorities.
“A traditional telco’s security program is built around one thing: stopping people from making free calls. That was the big threat in the 90s. We’ve flipped the script—our goal is to protect subscribers from privacy breaches and security threats. Totally different priorities.”
The conversation spans everything from telecom policy to how Cape is building a secure-by-design network for the modern age.
Want more stories like these? Subscribe to Cape’s newsletter here.