Zimperium Blog

Top 5 Mobile Security Risks for Enterprises

Mobile Security
1 minutes
Dec 05, 2024
Our blog is sharing the five biggest mobile security threats your business needs to be aware of
Read Full Post

Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025

Mobile Security
6 minutes
Nov 20, 2024
This blog shares Zimperium's 2025 mobile security trends and threat predictions.
Read Full Post

2022 Predictions: 5 Mobile Threats to Look for This Year

MTD
6 minutes
Nov 07, 2024
Recent years have made abundantly clear that attempting to predict what’s to come in the future can be a pretty dicey proposition. However, it is also
Read Full Post

Chrome OS Now Second-Most Popular Desktop Operating System

MTD
3 minutes
Nov 07, 2024
For the first time in the annual desktop operating system market share reports, Chrome OS has passed macOS. According to 2020 numbers from market data
Read Full Post

The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes

iOS & Android
13 minutes
Nov 07, 2024
More than a month has passed since Zimperium first broke the news of zLabs’ VP of Platform Research and Exploitation Joshua J. Drake’s discovery of
Read Full Post

Browser-based CVE-2015-3864 Metasploit Module Now Available for Testing

Threat Research
6 minutes
Nov 07, 2024
By:Zuk Avraham Follow Zuk Avraham (@ihackbanme)Joshua Drake Follow Joshua Drake (@jduck) Last year, we disclosed a series of critical vulnerabilities
Read Full Post

Don’t Kick Yourself Later for Not Knowing the Privacy and Security Risks of Your Mobile Apps Now

iOS & Android
5 minutes
Nov 07, 2024
New reports are published every week about privacy and security problems affecting everyday consumers via mobile apps. FaceApp, the mobile app for iOS and
Read Full Post

Banks Admit Cybersecurity is the Biggest Threat. Now What?

MTD
1 minutes
Nov 07, 2024
In JPMorgan Chase's 2018 annual report, CEO Jamie Dimon states in a widely read letter to shareholders the following. “The threat of cybersecurity may
Read Full Post