Resources

Webinar: Compliance and The Forgotten Endpoint

Zimperium, the global leader in enterprise mobile security, will host a webinar titled, “Compliance and Mobile Devices:  The Forgotten Endpoint.” Organizations in practically every industry, including financial services, retail, healthcare and more, are required to meet cybersecurity compliance requirements set by federal and state regulators. Penalties for non-compliance include massive fines […]

Read more

Threat Advisory: RedDrop

RedDrop is another in the long line of Android spyware apps. The malware has captured attention because of its ability to turn on microphones and exfiltrate sensitive data, but unfortunately that doesn’t make it unique. While there appears to be an elaborate network behind it, RedDrop is simply another Android […]

Read more

Fake BBC News App: Analysis

Follow @fvrmatteo On February 26, 2018, we received a notification from the detection system about a malicious sample with a suspicious package and Play Store name. We quickly verified the automatic analysis and confirmed the sample was actively trying to scam users to download it instead of the original BBC […]

Read more

CVE-2018-4087 PoC: Escaping the sandbox by misleading bluetoothd

Following my previous blog post titled “New Crucial Vulnerabilities in Apple’s bluetoothd daemon”, I am releasing the vulnerability PoC. The PoC is released for educational purposes and evaluation by IT Administrators and Pentesters alike, and should not be used in any unintended way. Furthermore, this PoC and any other related […]

Read more

Hey you, get off that cloud! Said no Zimperium person ever…

Zimperium Delivers First Mobile Security Solution Available On Any Cloud. Zimperium is proud to be the global leader in enterprise mobile security. We got there by one simple rule: listen to your customer. Our customers told us they didn’t want to be locked-in to any one cloud platform. They often […]

Read more

Don’t be caught on the wrong side of an attack

Using only cloud sourcing as the basis for mobile threat defense is the wrong side of an attack. We respect the boldness of a competitor’s CEO taking on the leader in his market. In a very literal sense, he laid his and his company’s cards on the table. This is […]

Read more

Zimperium Recognized in 2018 Cybersecurity Excellence Awards

The 2018 Cybersecurity Excellence Awards recently recognized Zimperium Mobile Threat Defense as the silver winner in the “Best Mobile Security Product” category. The 2018 Cybersecurity Excellence Awards are highly competitive. There were 400 entries in more than 70 categories. All of the winners and finalists reflect the very best in today’s […]

Read more

Dissecting mobile native code packers. A case study.

As mobile malware advances to the levels of desktop malware, it’s not uncommon to stumble upon protected APKs while analysing malware. Most of the times, the sample is simply obfuscated via classes/variables name stripping from the DEX file and/or strings obfuscation; but other times several layers divide the researcher from […]

Read more