Zimperium Blog

Don’t Claim to Be Aware of Cybersecurity and Fail to Secure 60% of Your Endpoints

iOS & Android
4 minutes
Oct 05, 2021
Welcome to Cybersecurity Awareness Month. While this month traditionally is more targeted at consumers, October is a great opportunity for all of us to
Read Full Post

GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally

Android
18 minutes
Sep 29, 2021
Research and writeup by Aazim Yaswant and Nipun Gupta With the increase of mobile device use in everyday life, it is no surprise to see cybercriminals
Read Full Post

Zimperium Powers the Telkomsel JagaJaga App to Protect Consumers on Their Mobile Devices.

iOS & Android
2 minutes
Sep 24, 2021
Last year 67% percent of the population in Indonesia used a smartphone. The number of smartphone users in the country is estimated to reach 239 million by
Read Full Post

The Evolution of Mobile Specific Phishing

Phishing
9 minutes
Sep 23, 2021
Over the last few months, the Zimperium zLabs team has been actively monitoring the rise in phishing attacks and some new data started to stand out. While
Read Full Post

Pegasus Spyware Resurfaces with Newly Revealed Zero-Click Vulnerability

iOS
2 minutes
Sep 14, 2021
On September 13, The Citizen Lab revealed new research surrounding the Pegasus spyware campaign, presenting further details around their discovery of a
Read Full Post

Financial Apps Are Not As Safe As You Think

Compliance
7 minutes
Aug 26, 2021
The Rise of Financial Mobile Apps Financial mobile applications help businesses across all sectors take advantage of growing markets. They create
Read Full Post

NSA Reports Rise in Publicly Known and Active Wi-Fi Attacks

Zimperium
6 minutes
Aug 25, 2021
The United States National Security Agency (NSA) recently released a Cybersecurity Information Sheet, “Securing Wireless Devices in Public Settings,”
Read Full Post

Zimperium Announces Government User Group

Zimperium
3 minutes
Aug 12, 2021
The modern public sector organization faces an increasingly sophisticated array of cyber threats, putting critical data and infrastructure constantly at
Read Full Post