Zimperium Blog

Addressing NIS2 Requirements: Why it's Time to Get Ready Now

iOS & Android
7 minutes
Nov 07, 2024
Complying with the NIS2 directive will represent a significant, broad-based effort for security teams, and strengthening the security of mobile devices and mobile apps will be a key part of those efforts.
Read Full Post

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

MTD
2 minutes
Nov 07, 2024
Businesses must recognize that operational resilience extends beyond cybersecurity; it encompasses the entire supply chain, ensuring that even routine updates do not disrupt operations.
Read Full Post

4 Reasons Why Companies Need To Protect Employee Phones Today

MTD
4 minutes
Nov 07, 2024
  If you search “data breach” on Google, you’ll get a variety of articles ranging from Equifax to the latest Quest Diagnostics data breach. However,
Read Full Post

Now Available: Integrate Mobile App Scans into CI/CD Pipeline Using GitHub Actions

Development
2 minutes
Nov 07, 2024
These days developers are incentivized to build mobile app features faster than ever, which frequently leads to releasing vulnerable code. Mobile
Read Full Post

Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware

Threat Research
13 minutes
Oct 30, 2024
In this blog post we share Zimperium’s Zero-Day Protection against the Water Makara Spear-Phishing campaign.
Read Full Post

Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign

Threat Research
2 minutes
Oct 21, 2024
In this blog post we share Zimperium’s Zero-Day Protection against the Water Makara Spear-Phishing campaign.
Read Full Post

Debunking Five Myths About Mobile Security

iOS & Android
5 minutes
Oct 17, 2024
Zimperium identifies and debunks the top five myths about mobile security and explained how to safeguard your enterprise with clarity and confidence.
Read Full Post

Expanding the Investigation: Deep Dive into Latest TrickMo Samples

Threat Research
7 minutes
Oct 11, 2024
Our analysis of TrickMo suggests that many of these samples remain undetected by the broader security community.
Read Full Post