Zimperium Blog

New Mobile Threat Alert - Operation Celestial Fore

iOS & Android
1 minutes
Jun 13, 2024
In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.
Read Full Post

Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots

iOS & Android
3 minutes
Jun 12, 2024
In this blog, Zimperium shares insight into the recent statement released by the National Security Agency (NSA) recommending Mobile Devices Best Practices due to the rising threat of mobile malware.
Read Full Post

Championing Security: Understanding CISA's Secure by Design Pledge

iOS & Android
3 minutes
Jun 06, 2024
In this blog, Zimperium shares how CISA's Secure by Design pledge is an important step towards a more secure digital future.
Read Full Post

The Crucial Need for Mobile Security in Retail Point of Sale Systems

iOS & Android
3 minutes
May 23, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post

The Multifaceted Threat Landscape of Mobile Security

iOS & Android
3 minutes
May 22, 2024
In this blog, Zimperium shares how the multifaceted threat landscape of mobile security expands beyond the SS7 protocol.
Read Full Post

Building a Robust Foundation: How to Build a Strong Application Security Posture

iOS & Android
5 minutes
May 21, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post

White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications

iOS & Android
4 minutes
May 16, 2024
Cryptography is routinely used to ensure data integrity and confidentiality. Yet, cryptographic protection is only as strong as the security of the used cryptographic keys.
Read Full Post

Every Industry's Battle: The Threat of Mobile Malware on the Enterprise

iOS & Android
7 minutes
May 15, 2024
Our research also shows that the 29 malware families we highlighted in the Heist report also target 478 non-banking mobile applications across 32 categories. 
Read Full Post