Zimperium Blog

Zimperium Coverage on COLDRIVER Phishing Campaign 

Threat Research
2 minutes
Oct 01, 2024
The recently uncovered "River of Phish" campaign, attributed to the Russian threat actor COLDRIVER, targets Western and Russian civil society through sophisticated spear-phishing attacks.
Read Full Post

Zimperium Detects New Android Spyware Targeting South Korea

Android
2 minutes
Sep 26, 2024
Security researchers at Cyble have uncovered a new Android spyware campaign primarily targeting individuals in South Korea. This sophisticated malware, masquerading as legitimate applications, poses a significant threat to user privacy and data security.
Read Full Post

How Application Shielding Fits into the DevSecOps Framework 

iOS & Android
5 minutes
Sep 18, 2024
What is a DevSecOps framework and why is it important?
Read Full Post

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

MTD
2 minutes
Sep 17, 2024
Zimperium has achieved the Australian Government security status of  PROTECTED after successfully completing an assessment performed by the Information Security Registered Assessors Program (IRAP) for its sovereign-hosted Mobile Threat Defense (MTD) solution.
Read Full Post

Unlocking the Hidden Costs of Mobile App Security in Low-Code Development

3 minutes
Sep 13, 2024
To achieve proper application security, you must ensure your protections act against active and relevant threats.
Read Full Post

A Network of Harm: Gigabud Threat and Its Associates

iOS & Android
3 minutes
Sep 12, 2024
This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 
Read Full Post

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Threat Research
2 minutes
Sep 09, 2024
Zimperium’s Zero-Day defense against a sophisticated Android malware campaign involving SpyAgent, a spyware strain designed to steal cryptocurrency credentials.
Read Full Post

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Threat Research
1 minutes
Sep 05, 2024
State-backed attackers and commercial surveillance vendors repeatedly using N-day exploits to target known vulnerabilities in devices. 
Read Full Post