The bill still needs to receive approval from the US House of Representatives
NSA, CISA Warn Against Threats to 5G Network Slicing
Improper network slice management may enable attackers to access data from different network slices
Loan Scam Campaign ‘MoneyMonger’ Exploits Flutter to Hide Malware
Zimperium said the code was part of an existing campaign previously discovered by K7 Security Labs
Why Do I Need Zero Trust on My Endpoint If I Have EDR/XDR?
Do you need a Zero Trust solution if you have EDR/XDR installed? The short answer is yes ? you need both.
Feds Hit DDoS-for-Hire Services with 48 Domain Seizures
Six also charged in connection with booter services
Over 85% of Attacks Hide in Encrypted Channels
Zscaler reveals 20% increase in malicious use of encryption
Platforms Flooded with 144,000 Phishing Packages
NuGet, PyPi and npm inundated with malicious packages
Signed Microsoft Drivers Used in Attacks Against Businesses
In some cases, the threat actor’s intent was to ultimately provide SIM-swapping services
AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow
These are some of the key findings from the latest Check Point Research Most Wanted report
Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability
The vulnerability could allow remote code execution (RCE) on a victim’s device