Zimperium

Zimperium

Zimperium Welcomes David Natker as VP of Global Partners and Alliances

Zimperium
2 minutes
Jul 17, 2024
We are thrilled to announce the appointment of David Natker as Zimperium’s new Vice President of Global Partners and Alliance
Read Full Post

Phishing Campaigns and Rafel RAT: A Dangerous Duo

MTD
3 minutes
Jul 15, 2024
Among the myriad of tools employed in malicious activities, Remote Access Trojans (RATs) stand out for their ability to provide attackers with unfettered access to compromised systems.
Read Full Post

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

MTD
3 minutes
Jul 08, 2024
Rafel RAT is a type of malware that allows attackers to gain complete control over a victim's mobile device. Once installed, Rafel RAT can perform a
Read Full Post

Unmasking Rafel RAT: Android Infiltration Campaign

Android
4 minutes
Jul 01, 2024
Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.
Read Full Post

New Mobile Threat Alert - Operation Celestial Fore

iOS & Android
1 minutes
Jun 13, 2024
In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.
Read Full Post

Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots

iOS & Android
3 minutes
Jun 12, 2024
In this blog, Zimperium shares insight into the recent statement released by the National Security Agency (NSA) recommending Mobile Devices Best Practices due to the rising threat of mobile malware.
Read Full Post

Championing Security: Understanding CISA's Secure by Design Pledge

iOS & Android
3 minutes
Jun 06, 2024
In this blog, Zimperium shares how CISA's Secure by Design pledge is an important step towards a more secure digital future.
Read Full Post

The Crucial Need for Mobile Security in Retail Point of Sale Systems

iOS & Android
3 minutes
May 23, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post