Zimperium Blog

ISM’s Guidelines for Enterprise Mobility

MTD
36 minutes
Oct 10, 2024
In this blog, we will analyze the ISM’s mobile controls, explore the risks they aim to mitigate, and outline practical approaches for addressing each control.
Read Full Post

Zimperium’s Zero-Day Defense Against Octo2 Malware Targeting European Banks

Threat Research
2 minutes
Oct 07, 2024
Zimperium’s Mobile Threat Defense (MTD) and its Mobile App Protection Suite (MAPS) solution provide robust protection against Octo2, detecting all known samples in a zero-day fashion.
Read Full Post

iOS and the WebP Vulnerability

Threat Research
7 minutes
Oct 07, 2024
In this blog post we will underline the differences and the similarities on how iOS developers reacted to the WebP vulnerability and our observed patching trends of those iOS applications. 
Read Full Post

Zimperium Coverage on COLDRIVER Phishing Campaign 

Threat Research
2 minutes
Oct 01, 2024
The recently uncovered "River of Phish" campaign, attributed to the Russian threat actor COLDRIVER, targets Western and Russian civil society through sophisticated spear-phishing attacks.
Read Full Post

Zimperium Detects New Android Spyware Targeting South Korea

Android
2 minutes
Sep 26, 2024
Security researchers at Cyble have uncovered a new Android spyware campaign primarily targeting individuals in South Korea. This sophisticated malware, masquerading as legitimate applications, poses a significant threat to user privacy and data security.
Read Full Post

How Application Shielding Fits into the DevSecOps Framework 

iOS & Android
5 minutes
Sep 18, 2024
What is a DevSecOps framework and why is it important?
Read Full Post

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

MTD
2 minutes
Sep 17, 2024
Zimperium has achieved the Australian Government security status of  PROTECTED after successfully completing an assessment performed by the Information Security Registered Assessors Program (IRAP) for its sovereign-hosted Mobile Threat Defense (MTD) solution.
Read Full Post

Unlocking the Hidden Costs of Mobile App Security in Low-Code Development

3 minutes
Sep 13, 2024
To achieve proper application security, you must ensure your protections act against active and relevant threats.
Read Full Post