The 5G mobile telecommunications is one the most important innovations so far. It delivers technological advances with high speed, low latency, and reliable connections to services such as: autonomous systems and large-scale deployments of IoT devices for Machine-Type Communications. Mobile communications systems are vulnerable to eminent security attacks. Each generation is characterized by certain security challenges. Particularly, in the 1G, cellular phones and their wireless channels were prone to masquerading attacks and illegal cloning. The 2G witnessed message spamming as a common attack vector. This type of malicious attack was used to inject errors and false information. In the third 3G, IP-based protocols and communication was first introduced. Therefore, the vulnerabilities of an internet-based system found their malicious way into the wireless domain. The sophisticated features of 4G led to an increase in attack surface targeting mobile-based systems. Lastly, in 5G network, the security threat vectors are expanded even more. The exposure of new connected device sand services creates flaws and increase the entry points for threat actors.