Transtelco Holding | November 16, 2021
Transtelco Holding, Inc. ("Transtelco") announced today that it has successfully completed the acquisition of Maxcom Telecomunicaciones, S.A.B de C.V., a sociedad anónima bursátil organized under the laws of the United Mexican States ("Maxcom") through concurrent and codependent public tender offers for Maxcom's equity and debt.
Transtelco's CEO, Miguel Fernandez, said of the transaction, "This complex acquisition marks an important milestone for Transtelco. After 20 years of being the leading binational B2B digital infrastructure service provider, this acquisition cements Transtelco's position in Mexico as having one of the most unique, scalable, and low latency networks with access routes to transport the country's data. The combined networks possess unique routes to move traffic to and from the United States, Mexico and the rest of the Americas. We are confident that under our leadership, as we did with Neutrona in 2020, we will be able to enhance operations to provide more resilient services to our customers while achieving greater scale and operating leverage with automation. We'd like to thank our shareholders and financing partners for their continued trust and support of our strategic vision."
The combined company will have over 25,000 kilometers of fiber throughout the United States and Mexico that will touch over 6,000 enterprise buildings.
Headquartered in El Paso, Texas, Transtelco is a leading global digital infrastructure service provider, which includes a state-of-the-art long-haul and metropolitan fiber network in the Southwestern U.S., Mexico and Latin America. It offers Dedicated Internet Access, Long-Haul & Metro Transport, Colocation and Telephony services to global telecom carriers and blue-chip enterprise customers. Transtelco's differentiated bi-national and bi-cultural approach allows it to consistently deliver superior results to customers and exceed expectations. Transtelco delivers services over its own infrastructure spanning from Los Angeles to Dallas and Tijuana to Mexico City through a unique network that provides route diversity, redundancy and protection. For more information, visit transtelco.net.
Headquartered in Mexico City, Maxcom is a facilities-based telecommunications provider that uses a "smart-build" approach to deliver last-mile connectivity, metropolitan and long-distance transportation services, colocation and other value-added services, both to the enterprise segment and to the national and international carrier segment. Maxcom provides its services over its unique and reliable fiber optic network, and has points of presence in the largest cities of Mexico such as Mexico City, Guadalajara, Monterrey, Queretaro, Leon and San Luis Potosi.
Google | June 02, 2020
According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure.
By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails.
Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials.
According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure. A number of phishing campaigns uncovered by the team of researchers found that threat actors are using Google Firebase storage URLs to dupe users into giving up their login credentials. By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. Once an unsuspecting user has entered their credentials, she fake page shares them with the hackers.
Per Trustwave: “This phishing campaign although low in volume seems to be targeting a range of industries, as well as being detected by our spam traps. Some exemplar phishing messages used in this campaign are illustrated here. The major themes include payment invoice, upgrade email account, release pending messages, verify account, account error, change password, etc.” Trustware also observed threat actors using the coronavirus pandemic and internet banking lures to trick victims into accessing fake vendor-payment forms designed to harvest users’ login credentials. Other tactics the hackers used included Microsoft Outlook and Office 365 phishing pages that harvest corporate login credentials.
Read more: NET ONE SYSTEMS ADOPTS JUNIPER'S CONTRAIL ENTERPRISE SOLUTION TO FURTHER NETWORKING INFRASTRUCTURE
The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls, Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams.
The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls,” Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams. To combat such phishing attempts, individuals and tech leaders should ensure that they’re up to date on hackers’ latest endeavors. As one might imagine, the more knowledgeable a user is, the better prepared they are to avoid falling victim to nefarious phishing campaigns. Hackers have been abusing Google’s cloud computing service to redirect and intercept web and mail traffic on an array of vulnerable consumer routers.
Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials.
The fraudulent emails cut through industries to take control of the Firebase’s data storage API in a Google Cloud Storage bucket and secretly keep malicious URLs in phishing emails, which then direct users to fraudulent pages. Fahim Abbasi, a researcher at Trustware, spoke about these phishing campaigns in his blog post and mentioned, while these campaigns deployed common phishing baits, the adoption of Google Firebase storage URLs made them look unique and authentic. He added, actors have taken undue advantage of Google’s reputation and cloud infrastructure to carry out phishing credential harvesting pages. Additionally, Abbasi also presented about nine examples with major themes of the phishing campaigns, which include release pending messages, payment invoice, verify account, upgrade email account, change password, account error, and several other similar to these.
Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search, Gmail and YouTube. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. Registration requires a credit card or bank account details. Google Cloud Platform provides infrastructure as a service, platform as a service, and serverless computing environments. In April 2008, Google announced App Engine, a platform for developing and hosting web applications in Google-managed data centers, which was the first cloud computing service from the company. The service became generally available. Since the announcement of the App Engine, Google added multiple cloud services to the platform.
Read more: COVID-19 HAS ACCELERATED THE LONG-DUE INVESTMENTS INTO DIGITAL INFRASTRUCTURE
businesswire | December 01, 2020
MaxLinear a main supplier of radio recurrence (RF), simple, advanced and blended sign coordinated circuits, reported today the expansion of its double yield power module family with the arrival of a double 18A (MxL7218) and two double 25A (MxL7225 and MxL7225-1) power modules. These recently delivered items add to the current group of intensity modules that incorporate double 4A (MxL7204) and double 13A (MxL7213) forms and address mechanical applications, for example, clinical and test gear. Moreover, these force modules supplement our industry driving foundation items, for example, 5G handsets and modems, long stretch optical TIAs and drivers, and link framework SoCs.
The double 18A and two double 25A force modules permit yields to be resembled for up to 36A or 50A per module, individually. Also, the force modules might be resembled for single force rails up to 300A. The MxL7225-1 gives added adaptability to tweak the control circle in situations where ideal transient execution is required.
Zeroed in on fueling FPGA, DSP and SoC high-current center and memory rails, these modules work from a 4.5V to 15V information voltage while giving set yield voltages from 0.6V to 1.8V. Utilizing an industry standard pinout, planners can without much of a stretch scale the force levels to coordinate the necessary burden. As force levels increment, productivity and warm execution gets key. Not exclusively do these modules have superb warm conductivity to the board, however by setting inductors remotely and limiting mold compound thickness, the case temperature can be as much as 13°C cooler without the complex inner warmth sinking structures found in contending modules.