Resources

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

“Watering Hole” is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker typically observes which websites or applications the group often uses and infects one or more of them with malware. Eventually, some members of the targeted group […]

Read more

WhatsApp Buffer Overflow Vulnerability: Under the Scope

Researcher: Chilik Tamir (@_coreDump)   Recently, Zimperium blogged about the new WhatsApp vulnerability disclosed by Facebook on May 13th. This vulnerability was reportedly exploited in the wild, and it was designated as CVE-2019-3568. A previous post by Zimperium gave some preliminary information about the vulnerability, impacted WhatsApp products, an alleged […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #1: Advanced, Purpose-Built Threat Detection

Our first free webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” deals with Advanced, Purpose-Built Threat Detection, and took place on June 19, 2019. Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. The reality is, mobile devices are now the […]

Read more

CVE-2019-8545: Vulnerability in IOHIDFamily.kext

Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function IOHIDEventServiceFastPathUserClient::getSharedMemorySize, the ClientObject (Offset 0xE0 of the user client) is given to a function which assumes it is initialised (It should be initialised via external method 0 — IOHIDEventServiceFastPathUserClient::_open). Calling […]

Read more

Zimperium’s Compliance Webinar Series: CCPA Compliance for Mobile Devices – The 60% of Endpoints Often Unprotected

The California Consumer Privacy Act (CCPA) has been characterized as “the beginning of America’s General Data Protection Regulation (GDPR),” and its aim is to enhance privacy rights and consumer protection for residents of California. Businesses subject to CCPA must meet strict requirements relating to their use of personally identifiable consumer […]

Read more

Another Day, Another App Breach

  They say it happens in threes. This time, the three are: Flipboard, the social sharing site and news aggregator, reset millions of user passwords after hackers gained access to its systems several times over a nine-month period; Developer platform Stack Overflow earlier this month confirmed a breach involving “a […]

Read more

Zimperium’s Compliance Webinar Series: NERC Compliance for Mobile Devices – The 60% of Endpoints Often Unprotected

NERC Critical Infrastructure Protection (CIP) is designed to secure the assets required for operating North America’s bulk electric system. Since mobile devices from smartphones to tablets are increasingly being used by technicians to service critical infrastructure, it’s vital to ensure organization’s mobile devices are NERC compliant – just as your […]

Read more