AdaptiveMobile Security

Leveraging mobile networks to threaten national security
In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …

Using mobile networks for cyber attacks as part of a warfare strategy
AdaptiveMobile Security published a research which highlights how vulnerabilities in mobile network infrastructure could be weaponized in offensive military operations. …
Enea acquires AdaptiveMobile Security to strengthen its 5G network security portfolio
AdaptiveMobile Security announced that is has been acquired by Enea. Enea’s focus areas are cloud-native, 5G-ready products for data management, mobile video traffic …
AdaptiveMobile Security’s 5G security platforms protect mobile networks against cyber threats
AdaptiveMobile Security announced a new trio of interconnected 5G security platforms that allows carriers to protect against internal and external security threats to their 5G …

5G network slicing vulnerability leaves enterprises exposed to cyberattacks
AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …

Simjacker vulnerability actively exploited to track, spy on mobile phone owners
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …
AdaptiveMobile Security launches Commercial Traffic Management
AdaptiveMobile Security launched ‘Commercial Traffic Management’ (CTM) controls for all forms of mobile messaging. This new proposition enables operators and aggregators to …

New infosec products of the week: September 15, 2017
FinalCode 5.3 extends the types of applications traditional IRM can support FinalCode updated its persistent, file-centric information rights management (IRM) solution. …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems