Zimperium Blog

Zimperium’s Comprehensive Protection Against Fake SBI Reward Banking Trojan

Android
1 minutes
Jan 27, 2025
As part of our ongoing mission to identify emerging threats to mobile security, our zLabs team shares how we can help protect you against fake SBI Reward banking trojan.
Read Full Post

Hidden in Plain Sight: PDF Mishing Attack

Android
12 minutes
Jan 24, 2025
As part of our ongoing mission to identify emerging threats to mobile security, our zLabs team has been actively tracking a phishing campaign impersonating the United States Postal Service (USPS) which is exclusively targeting mobile devices.
Read Full Post

Zimperium’s Coverage Against Android Malware in Donot APT Operations and Extended Indicators of Compromise

Threat Research
1 minutes
Jan 23, 2025
Take a look at Zimperium’s coverage against Android malware in Donot APT operations and extended indicators of compromise.
Read Full Post

How Zimperium Can Help With Advanced Spyware Such as NoviSpy

Android
5 minutes
Dec 19, 2024
Discover how Zimperium can help with advanced spyware such as NoviSpy.
Read Full Post

Mobile Spear Phishing Targets Executive Teams

Threat Research
6 minutes
Dec 18, 2024
Over the past few months, enterprises have observed a pattern of sophisticated spearphishing attempts targeting their executives, with some specifically targeting their mobile devices. Our blog shares the details.
Read Full Post

Top 5 Cryptographic Key Protection Best Practices

Mobile Security
5 minutes
Dec 17, 2024
We're sharing top 5 cryptographic key protection best practices.
Read Full Post

Securing Mobile Devices and Apps: Critical Operational Resilience in Airlines

Mobile Security
4 minutes
Dec 12, 2024
Our blog is sharing the five biggest mobile security threats your business needs to be aware of
Read Full Post

AppLite: A New AntiDot Variant Targeting Mobile Employee Devices

Mobile Security
16 minutes
Dec 10, 2024
Our zLabs team has identified an extremely sophisticated mishing (mobile-targeted phishing) campaign that delivers malware to the user’s Android mobile device enabling a broad set of malicious actions including credential theft of banking, cryptocurrency and other critical applications. 
Read Full Post