Zimperium Blog

A Network of Harm: Gigabud Threat and Its Associates

iOS & Android
3 minutes
Sep 12, 2024
This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 
Read Full Post

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Threat Research
2 minutes
Sep 09, 2024
Zimperium’s Zero-Day defense against a sophisticated Android malware campaign involving SpyAgent, a spyware strain designed to steal cryptocurrency credentials.
Read Full Post

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Threat Research
1 minutes
Sep 05, 2024
State-backed attackers and commercial surveillance vendors repeatedly using N-day exploits to target known vulnerabilities in devices. 
Read Full Post

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

iOS & Android
6 minutes
Sep 05, 2024
Mobile app developers committed to upholding the highest security standards are faced with several considerations when developing and maintaining banking apps. Learn more.
Read Full Post

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

MTD
2 minutes
Sep 04, 2024
As we continue to strengthen our presence in India and South Asia, we are excited to announce the appointment of Shashank Pathak to our Go-to-Market team.
Read Full Post

DAST Best Practices for Mobile Developers

iOS & Android
4 minutes
Sep 03, 2024
This blog post will guide you through the essential best practices for integrating DAST into your mobile development process.
Read Full Post

Deep Dive into Phishing Chronology: Threats and Trends 

iOS & Android
6 minutes
Aug 28, 2024
This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 
Read Full Post

Dynamic Application Security Testing vs. Static Application Security Testing

iOS & Android
2 minutes
Aug 26, 2024
Learn the top 7 source code obfuscation techniques.
Read Full Post