5G / Telecom

Challenges

Telecom operators and digital service providers need to integrate and operate new OSS and BSS platforms to support 5G. SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) technologies have improved network capabilities, but increased connectivity brings new cyber risks. New applications are exposed to malicious attacks, making perimeter security inadequate.

Our solution and benefits

The Moabi platform offers automated cybersecurity audits for software, operating systems, applications and firmware without requiring source code. It offers comprehensive and scalable assessment for in-house R&D products, third-party vendors and open source, enabling telecom operators to better manage cybersecurity risks.

Results

A more secure digital environment thanks to effective testing and analysis, risk mitigation and a significant improvement in the overall cybersecurity posture of digital networks and systems.

Article, News & Post

Recent Blog & Post

Explore our articles for ideas, tips and perspectives on innovation and cybersecurity – perhaps you’ll find the inspiration or answers you’re looking for.

Feedback: what we took away from Insomni’hack 2026

We’ve just returned from Insomni’hack, a must-attend hacking conference in Europe, with our conviction further strengthened:cybersecurity remains a field where hands-on practice, experimentation and direct dialogue play a vital role. We would like to thank EPFL once again for their invitation and for allowing us to participate in the event with a stand. Over the course of these few days, we had the opportunity to attend several talks, engage with numerous stakeholders in the ecosystem and discover some particularly interesting technical approaches. Here are a few key takeaways. A stark reminder of the reality of cyberattacks The principal highlight was the screening of the documentary “Don’t go to the police”, presented by Orange Cyberdefense. This type of content offers a different perspective:less technical in form, but extremely concrete in substance. It highlights: This kind of feedback serves as a reminder that behind the vulnerabilities and exploits, there are above all organisations facing complex situations, often in a state of emergency. Demonstrations that reflect the reality on the ground Among the technical demonstrations, some focused on specific attack scenarios, particularly those involving embedded systems. A striking example:a demonstration showing how a vehicle, such as a Tesla, can be targeted via a vector as simple as a USB port. Without going into technical details, this type of demonstration highlights several key points: These examples clearly illustrate the difficulty of securing modern systems, where hardware, software and user interfaces are deeply intertwined. A community as active as ever Beyond the talks, Insomni’hack remains first and foremost a place for exchange. We were able to speak with: These exchanges, often informal, allow us to compare approaches, discover new ideas and better understand the challenges encountered in the field. This is also what makes this type of event so valuable:the opportunity to step outside the usual framework to discuss technical matters directly and openly. What we take away from it This type of conference highlights several key points: Insomni’hack confirms, once again, the importance of technical events within the cybersecurity ecosystem. They not only enable us to keep pace with developments in the field, but also to compare ideas, share feedback and fuel technical discussions. We leave with numerous avenues to explore, fresh ideas, and a desire to continue delving into these topics.

Read More »

INSOMNI’HACK 2026

Cybersecurity is a field where innovation is advancing rapidly. New attack techniques, new analysis methods, new tools: practices are constantly evolving and knowledge must be continuously updated. In this context, technical conferences play an important role in the ecosystem. They provide an opportunity to share work, discover new approaches and, above all, maintain dialogue between the various communities that are advancing IT security. It is in this spirit that MOABI will participate this year in Insomni’hack, which will be held in Switzerland. We warmly thank EPFL for its invitation and for allowing us to have a stand at the event. Technical conferences: an essential monitoring tool In a field as technical as cybersecurity, monitoring cannot rely solely on online articles or publications. Conferences provide direct access to the work of researchers, engineers and practitioners who share their discoveries and experiments. They often reveal: These presentations often provide an overview of the technical trends that will influence the tools and practices of the coming years. A meeting place for the security community Beyond the conferences themselves, these events are above all places for exchange. They bring together a very diverse community: academic researchers, security engineers, tool developers, students, consultants and members of technical communities. Informal discussions often play just as important a role as official presentations. They provide an opportunity to exchange ideas, share feedback and sometimes spark new collaborations. In a field where many innovations arise from experimentation and technical curiosity, these meetings contribute greatly to the vitality of the ecosystem. At the frontier between research and industrial applications At MOABI, we attach great importance to this exchange between cybersecurity research and practical applications. Our work focuses in particular on analysing software from its binaries, using automated reverse engineering techniques. These approaches enable us to examine software, firmware and third-party components, even when access to the source code is not possible. In a context where organisations are increasingly dependent on software developed by third parties or integrated into complex systems, these methods are becoming essential for a better understanding of the risks associated with software and the software supply chain. Come and meet us at Insomni’hack We will have a stand at the event and will also be offering a number of technical demonstrations on reverse engineering and software analysis. If you work on topics such as reverse engineering, binary analysis or software security, we would be delighted to talk to you. We look forward to seeing you at Insomni’hack. More information: insomnihack.ch

Read More »