Zimperium MAPS Posts

Don’t Kick Yourself Later for Not Knowing the Privacy and Security Risks of Your Mobile Apps Now

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Read More

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Read More

Now Available: Integrate Mobile App Scans into CI/CD Pipeline Using GitHub Actions

Read More

Debunking Five Myths About Mobile Security

Read More

ISM’s Guidelines for Enterprise Mobility

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Read More

How Application Shielding Fits into the DevSecOps Framework 

Read More

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

Read More

A Network of Harm: Gigabud Threat and Its Associates

Read More

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Read More

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Read More

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

Read More

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

Read More

DAST Best Practices for Mobile Developers

Read More

Deep Dive into Phishing Chronology: Threats and Trends 

Read More

Dynamic Application Security Testing vs. Static Application Security Testing

Read More

Securing Agency Devices: The Critical Need for Mobile App Vetting

Read More

Integrating DAST in the Development Cycle

Read More

BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection

Read More

Top 7 Source Code Obfuscation Techniques

Read More

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Read More

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

Read More

Phishing Campaigns and Rafel RAT: A Dangerous Duo

Read More

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

Read More

Beyond the App Store: The Hidden Risks of Sideloading Apps

Read More

Emerging Trends of Binary Analysis

Read More

The Crucial Need for Mobile Security in Retail Point of Sale Systems

Read More

The Multifaceted Threat Landscape of Mobile Security

Read More

Building a Robust Foundation: How to Build a Strong Application Security Posture

Read More

White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications

Read More

Every Industry's Battle: The Threat of Mobile Malware on the Enterprise

Read More

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

Read More

Your new car may be safer and smarter, but is it cyber-secure?

Read More

More Malware May be Exposed to iOS Devices Because of Supreme Court Ruling

Read More

You May Want to Hold off on Saying “Cheese” for FaceApp

Read More

Mobile Endpoint Security and Antivirus | Differences Between the Two

Read More

Securing Your React Native Apps: Top 6 Concerns to Address

Read More

Mobile Banking and The Modern Day Bonnie and Clyde: Is Your App Safe?

Read More

Mobile Banking Fraud vs. Mobile Banking Scams: The Risks and Repercussions

Read More