Mobile Applications
Mobile Application Security
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
Mobile Security Solutions by Industry
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
Company
About Us
Blog
Careers
Newsroom
Support
Partners
Partner Network
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
›
Mobile Security Solutions by Industry
›
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
›
Company
›
About Us
Blog
Careers
Newsroom
Support
Partners
›
Partner Network
Become a Partner
Zimperium
Posts
Mobile App Security Gaps Widen as Overconfidence Masks Real Risks
iCloud Calendar Invites Abused to Phish PayPal Users via Legitimate Infrastructure
Hidden VPN App Families Expose Users via Shared Secrets and Ownership Deception
SIM Swapping Attacks Surge Globally, Fueled by Breaches and Leaks
Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
Android Security Update Fixes Actively Exploited High-Severity Vulnerabilities
Malvertising on Meta Serves Android Users a Crypto-Stealing Trojan
Mobile Development Speed Increasingly Outpaces Essential Security Measures
Android Droppers Evolve to Deliver Spyware and SMS Stealers Under the Radar
Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links
Attackers Abuse Google Classroom to Launch Phishing Campaigns Against Mobile Users
Mobile Social Engineering Escalates with Smishing, Vishing, and Quishing Trends
“Ghost Tapping” Scam Loads Stolen Card Data onto Mobile Wallets
Threat Actors Refine Android Droppers to Stealthily Deploy Mobile Malware
Anti-Tamper Protections Strengthen Mobile Apps Against Runtime Threats
South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones
Delete Messages Containing “.XIN” to Avoid Mobile Phishing Risks
QR Code ‘Quishing’ Attacks Exploit Trust to Steal Data from Mobile Users
Mobile Phishers Target Brokerage Customers in Ramp-and-Dump Scam
Digital Identity Wallets Face Growing Mobile Security and Regulatory Challenges
Android Malware Abuses NFC to Steal Banking Credentials
SparkKitty Malware Sneaks into Trusted Mobile Apps to Harvest Sensitive Photos
VexTrio TDS System Spreading Fake VPNs and Optimizers via Official App Stores
Rapid Response: Zimperium Detects Lazarus Stealer Campaign with Full Coverage and Additional Samples
Millions Affected in Massive Telecom Data Breach
Surge in Compromised Credentials in 2025
Data Breach Trends Highlight Mobile and Credential Risks
Hackers Are Cracking Mobile Browsers to Bypass Security
Healthcare Faces Security Risks from Shared Mobile Devices
Instagram Users Targeted by Sneaky New Phishing Scam
Plug-and-Play Malware Models Target Android Devices
Possible Mobile Service Disruptions Following Suspected Cyberattack
Mobile App Vulnerabilities Can Have Wider Implications
Critical Security Flaw Could Let Hackers Bypass Logins
Email Attacks Continue to Evolve and Expand Their Impact
Global Mobile Phishing Networks Are Getting Smarter
Surveillance Vendor Exploits SS7 Flaw to Track Phones Worldwide
Android Users Shouldn’t Disable Authentication Lock Feature, Even Though You Can
Travel Is Up and So Are the Risks 5 Million Public Unsecured Wi-Fi Networks Exposed
Securing Every Android Work Device: Zimperium and Android Enterprise Enable Smarter, Safer Access
Zimperium’s Takeaways from RSAC 2025: Addressing the Mobile Blind Spot
Enhancing Mobile Security: Zimperium and CrowdStrike Expand Strategic Partnership
Top 5 Cryptographic Key Protection Best Practices
Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025
Addressing NIS2 Requirements: Why it's Time to Get Ready Now
ISM’s Guidelines for Enterprise Mobility
Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status
Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India
Securing Agency Devices: The Critical Need for Mobile App Vetting
Zimperium Welcomes David Natker as VP of Global Partners and Alliances
Phishing Campaigns and Rafel RAT: A Dangerous Duo
Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks
Unmasking Rafel RAT: Android Infiltration Campaign
New Mobile Threat Alert - Operation Celestial Fore
Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots
Championing Security: Understanding CISA's Secure by Design Pledge
The Crucial Need for Mobile Security in Retail Point of Sale Systems
Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle
Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats
Sophisticated Fake Apps: A Growing Concern
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps
Mobile Device Management & Mobile Threat Defense: A Love Story
The Risks of Quishing and How Enterprises Can Stay Secure
Modern Mobile Device Protection: Why Legacy Approaches Fall Short
Global Mobile Threat Report: Emerging Endpoint Security Risks in 2022
Securing the Mobile-First Business
Harnessing NIST Standards for Your Mobile-First Security Strategy
Secure Boston Helps Keep Mobile Devices Safe
Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques
Mobile Ransomware - How Handheld and Mobile Devices Leave Organizations Exposed
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security
Risky Apps: How They Can Pose Threats to Your Security
Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime
Lessons from The Recent Activision Hacker Attacks
The Risks of Holiday Shopping and What to Do About Them
Phishing Is On The Rise. Why You Need a Mobile Security Strategy