Zimperium MAPS Posts

Extended Rapid Response: Zimperium Expands Detection of PlayPraetors Android RAT Campaign with Additional Samples and Targets

Read More

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Read More

How Application Shielding Fits into the DevSecOps Framework 

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Read More

Now Available: Integrate Mobile App Scans into CI/CD Pipeline Using GitHub Actions

Read More

Debunking Five Myths About Mobile Security

Read More

ISM’s Guidelines for Enterprise Mobility

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Read More

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

Read More

A Network of Harm: Gigabud Threat and Its Associates

Read More

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Read More

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Read More

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

Read More

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

Read More

DAST Best Practices for Mobile Developers

Read More

Deep Dive into Phishing Chronology: Threats and Trends 

Read More

Dynamic Application Security Testing vs. Static Application Security Testing

Read More

Securing Agency Devices: The Critical Need for Mobile App Vetting

Read More

Integrating DAST in the Development Cycle

Read More

BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection

Read More

Top 7 Source Code Obfuscation Techniques

Read More

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Read More

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

Read More

Phishing Campaigns and Rafel RAT: A Dangerous Duo

Read More

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

Read More

Beyond the App Store: The Hidden Risks of Sideloading Apps

Read More

Emerging Trends of Binary Analysis

Read More

The Crucial Need for Mobile Security in Retail Point of Sale Systems

Read More