Posts
-
Mobile Apps Found to Bypass Permissions to Spy on Users
-
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
-
University MDM Policies on Personal Devices Raise Cybersecurity Concerns
-
CBP Audit Reveals Weak Mobile Security Across Hundreds of Thousands of Devices
-
Neon Call-Recording App Exposed Phone Numbers, Recordings, and Transcripts
-
Ivanti Mobile MDM Exploited Through Chained Zero-Day
-
Misconfigured Firebase Apps Leave Sensitive User Data Exposed
-
Samsung Zero-Click Zero-Day Enables Remote Code Execution via Image Flaw
-
SlopAds Ad Fraud Operation Uses Hidden Apps and Obfuscation to Abuse Mobile Advertising
-
Samsung Addresses Zero-Day Vulnerability Exploited in Android Devices
-
French Advisory Reveals Surge in Apple Spyware Activity
-
PhantomCall Malware Disguised as Fake Chrome Apps Orchestrates Global Banking Fraud
-
Mobile Driver’s Licenses Bring New Digital ID Risks Alongside Convenience
-
Mobile App Security Gaps Widen as Overconfidence Masks Real Risks
-
iCloud Calendar Invites Abused to Phish PayPal Users via Legitimate Infrastructure
-
Hidden VPN App Families Expose Users via Shared Secrets and Ownership Deception
-
SIM Swapping Attacks Surge Globally, Fueled by Breaches and Leaks
-
Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
-
Android Security Update Fixes Actively Exploited High-Severity Vulnerabilities
-
Malvertising on Meta Serves Android Users a Crypto-Stealing Trojan
-
Mobile Development Speed Increasingly Outpaces Essential Security Measures
-
Android Droppers Evolve to Deliver Spyware and SMS Stealers Under the Radar
-
Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links
-
Attackers Abuse Google Classroom to Launch Phishing Campaigns Against Mobile Users
-
Mobile Social Engineering Escalates with Smishing, Vishing, and Quishing Trends
-
“Ghost Tapping” Scam Loads Stolen Card Data onto Mobile Wallets
-
Threat Actors Refine Android Droppers to Stealthily Deploy Mobile Malware
-
Anti-Tamper Protections Strengthen Mobile Apps Against Runtime Threats
-
SonicWall Advisory SNWLID-2025-0015 Raises Alarms Around VPN Exploits
-
South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones
-
Delete Messages Containing “.XIN” to Avoid Mobile Phishing Risks
-
QR Code ‘Quishing’ Attacks Exploit Trust to Steal Data from Mobile Users
-
Mobile Phishers Target Brokerage Customers in Ramp-and-Dump Scam
-
Digital Identity Wallets Face Growing Mobile Security and Regulatory Challenges
-
Android Malware Abuses NFC to Steal Banking Credentials
-
SparkKitty Malware Sneaks into Trusted Mobile Apps to Harvest Sensitive Photos
-
VexTrio TDS System Spreading Fake VPNs and Optimizers via Official App Stores
-
Rapid Response: Zimperium Detects Lazarus Stealer Campaign with Full Coverage and Additional Samples
-
Millions Affected in Massive Telecom Data Breach
-
Surge in Compromised Credentials in 2025
-
Data Breach Trends Highlight Mobile and Credential Risks
-
Hackers Are Cracking Mobile Browsers to Bypass Security
-
Healthcare Faces Security Risks from Shared Mobile Devices
-
Instagram Users Targeted by Sneaky New Phishing Scam
-
Plug-and-Play Malware Models Target Android Devices
-
Possible Mobile Service Disruptions Following Suspected Cyberattack
-
Mobile App Vulnerabilities Can Have Wider Implications
-
Critical Security Flaw Could Let Hackers Bypass Logins
-
Email Attacks Continue to Evolve and Expand Their Impact
-
Global Mobile Phishing Networks Are Getting Smarter
-
Surveillance Vendor Exploits SS7 Flaw to Track Phones Worldwide
-
Android Users Shouldn’t Disable Authentication Lock Feature, Even Though You Can
-
Travel Is Up and So Are the Risks 5 Million Public Unsecured Wi-Fi Networks Exposed
-
Securing Every Android Work Device: Zimperium and Android Enterprise Enable Smarter, Safer Access
-
Zimperium’s Takeaways from RSAC 2025: Addressing the Mobile Blind Spot
-
Enhancing Mobile Security: Zimperium and CrowdStrike Expand Strategic Partnership
-
Top 5 Cryptographic Key Protection Best Practices
-
Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025
-
Addressing NIS2 Requirements: Why it's Time to Get Ready Now
-
ISM’s Guidelines for Enterprise Mobility
-
Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status
-
Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India
-
Securing Agency Devices: The Critical Need for Mobile App Vetting
-
Zimperium Welcomes David Natker as VP of Global Partners and Alliances
-
Phishing Campaigns and Rafel RAT: A Dangerous Duo
-
Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks
-
Unmasking Rafel RAT: Android Infiltration Campaign
-
New Mobile Threat Alert - Operation Celestial Fore
-
Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots
-
Championing Security: Understanding CISA's Secure by Design Pledge
-
The Crucial Need for Mobile Security in Retail Point of Sale Systems
-
Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle
-
Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats
-
Sophisticated Fake Apps: A Growing Concern
-
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps
-
Mobile Device Management & Mobile Threat Defense: A Love Story
-
The Risks of Quishing and How Enterprises Can Stay Secure
-
Modern Mobile Device Protection: Why Legacy Approaches Fall Short
-
Global Mobile Threat Report: Emerging Endpoint Security Risks in 2022
-
Securing the Mobile-First Business
-
Harnessing NIST Standards for Your Mobile-First Security Strategy
-
Secure Boston Helps Keep Mobile Devices Safe
-
Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques
-
Mobile Ransomware - How Handheld and Mobile Devices Leave Organizations Exposed
-
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security
-
Risky Apps: How They Can Pose Threats to Your Security
-
Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime
-
Lessons from The Recent Activision Hacker Attacks
-
The Risks of Holiday Shopping and What to Do About Them
-
Phishing Is On The Rise. Why You Need a Mobile Security Strategy