Zimperium Blog

aLTEr: POC Exploit of LTE Layer Two

Threat Research
5 minutes
Jul 02, 2024
Long Term Evolution (LTE) is the latest mobile telephony standard designed to bring many security improvements over the predecessor standard known as the
Read Full Post

Unmasking Rafel RAT: Android Infiltration Campaign

Android
4 minutes
Jul 01, 2024
Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.
Read Full Post

Beyond the App Store: The Hidden Risks of Sideloading Apps

iOS & Android
13 minutes
Jun 19, 2024
Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.
Read Full Post

Emerging Trends of Binary Analysis

iOS & Android
6 minutes
Jun 18, 2024
In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.
Read Full Post

New Mobile Threat Alert - Operation Celestial Fore

iOS & Android
1 minutes
Jun 13, 2024
In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.
Read Full Post

Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots

iOS & Android
3 minutes
Jun 12, 2024
In this blog, Zimperium shares insight into the recent statement released by the National Security Agency (NSA) recommending Mobile Devices Best Practices due to the rising threat of mobile malware.
Read Full Post

Championing Security: Understanding CISA's Secure by Design Pledge

iOS & Android
3 minutes
Jun 06, 2024
In this blog, Zimperium shares how CISA's Secure by Design pledge is an important step towards a more secure digital future.
Read Full Post

The Crucial Need for Mobile Security in Retail Point of Sale Systems

iOS & Android
3 minutes
May 23, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post