Ios Android

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Businesses must recognize that operational resilience extends beyond cybersecurity; it encompasses the entire supply chain, ensuring that even routine updates do not disrupt operations.

Read More

How Application Shielding Fits into the DevSecOps Framework 

What is a DevSecOps framework and why is it important?

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

In JPMorgan Chase's 2018 annual report, CEO Jamie Dimon states in a widely read letter to shareholders the following. “The threat of cybersecurity may

Read More

2022 Predictions: 5 Mobile Threats to Look for This Year

Recent years have made abundantly clear that attempting to predict what’s to come in the future can be a pretty dicey proposition. However, it is also

Read More

The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes

More than a month has passed since Zimperium first broke the news of zLabs’ VP of Platform Research and Exploitation Joshua J. Drake’s discovery of

Read More

Browser-based CVE-2015-3864 Metasploit Module Now Available for Testing

By:Zuk Avraham Follow Zuk Avraham (@ihackbanme)Joshua Drake Follow Joshua Drake (@jduck) Last year, we disclosed a series of critical vulnerabilities

Read More

Addressing NIS2 Requirements: Why it's Time to Get Ready Now

Complying with the NIS2 directive will represent a significant, broad-based effort for security teams, and strengthening the security of mobile devices and mobile apps will be a key part of those efforts.

Read More

4 Reasons Why Companies Need To Protect Employee Phones Today

  If you search “data breach” on Google, you’ll get a variety of articles ranging from Equifax to the latest Quest Diagnostics data breach. However,

Read More

Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware

In this blog post we share Zimperium’s Zero-Day Protection against the Water Makara Spear-Phishing campaign.

Read More

Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign

In this blog post we share Zimperium’s Zero-Day Protection against the Water Makara Spear-Phishing campaign.

Read More

Debunking Five Myths About Mobile Security

Zimperium identifies and debunks the top five myths about mobile security and explained how to safeguard your enterprise with clarity and confidence.

Read More

Expanding the Investigation: Deep Dive into Latest TrickMo Samples

Our analysis of TrickMo suggests that many of these samples remain undetected by the broader security community.

Read More

ISM’s Guidelines for Enterprise Mobility

In this blog, we will analyze the ISM’s mobile controls, explore the risks they aim to mitigate, and outline practical approaches for addressing each control.

Read More

Zimperium’s Zero-Day Defense Against Octo2 Malware Targeting European Banks

Zimperium’s Mobile Threat Defense (MTD) and its Mobile App Protection Suite (MAPS) solution provide robust protection against Octo2, detecting all known samples in a zero-day fashion.

Read More

iOS and the WebP Vulnerability

In this blog post we will underline the differences and the similarities on how iOS developers reacted to the WebP vulnerability and our observed patching trends of those iOS applications. 

Read More

Zimperium Coverage on COLDRIVER Phishing Campaign 

The recently uncovered "River of Phish" campaign, attributed to the Russian threat actor COLDRIVER, targets Western and Russian civil society through sophisticated spear-phishing attacks.

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Security researchers at Cyble have uncovered a new Android spyware campaign primarily targeting individuals in South Korea. This sophisticated malware, masquerading as legitimate applications, poses a significant threat to user privacy and data security.

Read More

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

Zimperium has achieved the Australian Government security status of  PROTECTED after successfully completing an assessment performed by the Information Security Registered Assessors Program (IRAP) for its sovereign-hosted Mobile Threat Defense (MTD) solution.

Read More

A Network of Harm: Gigabud Threat and Its Associates

This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 

Read More

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Zimperium’s Zero-Day defense against a sophisticated Android malware campaign involving SpyAgent, a spyware strain designed to steal cryptocurrency credentials.

Read More

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

State-backed attackers and commercial surveillance vendors repeatedly using N-day exploits to target known vulnerabilities in devices. 

Read More

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

Mobile app developers committed to upholding the highest security standards are faced with several considerations when developing and maintaining banking apps. Learn more.

Read More

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

As we continue to strengthen our presence in India and South Asia, we are excited to announce the appointment of Shashank Pathak to our Go-to-Market team.

Read More

DAST Best Practices for Mobile Developers

This blog post will guide you through the essential best practices for integrating DAST into your mobile development process.

Read More

Deep Dive into Phishing Chronology: Threats and Trends 

This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 

Read More

Dynamic Application Security Testing vs. Static Application Security Testing

Learn the top 7 source code obfuscation techniques.

Read More

Securing Agency Devices: The Critical Need for Mobile App Vetting

This blog will explore the various types of risky apps and the concerns they pose, emphasizing the need for stringent mobile app vetting processes.

Read More

Integrating DAST in the Development Cycle

Learn the top 7 source code obfuscation techniques.

Read More

BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection

Learn the top 7 source code obfuscation techniques.

Read More

Top 7 Source Code Obfuscation Techniques

Learn the top 7 source code obfuscation techniques.

Read More

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

In this blog post, we will dive into a large-scale, Android-targeted SMS stealer campaign that our zLabs team discovered and has tracked since February 2022

Read More

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

The recent incidents involving the pro-Houthi group OilAlpha, which targeted humanitarian organizations in Yemen, underscore the critical need for effective protection against RATs.

Read More

Zimperium is Named a Leader in the Forrester Wave™ for MTD

We are excited to share that Zimperium has been named a Leader in The Forrester Wave ™ : Mobile Threat Defense Solutions, Q3 2024.

Read More

Phishing Campaigns and Rafel RAT: A Dangerous Duo

Among the myriad of tools employed in malicious activities, Remote Access Trojans (RATs) stand out for their ability to provide attackers with unfettered access to compromised systems.

Read More

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

Rafel RAT is a type of malware that allows attackers to gain complete control over a victim's mobile device. Once installed, Rafel RAT can perform a

Read More

Medusa Reborn: Zimperium’s Robust Defense

For the past two years, Zimperium has released the Mobile Banking Heist Report, providing in-depth research on the latest malware families, new attack

Read More

Unmasking Rafel RAT: Android Infiltration Campaign

Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.

Read More

Beyond the App Store: The Hidden Risks of Sideloading Apps

Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.

Read More

Emerging Trends of Binary Analysis

In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.

Read More

New Mobile Threat Alert - Operation Celestial Fore

In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.

Read More

Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots

In this blog, Zimperium shares insight into the recent statement released by the National Security Agency (NSA) recommending Mobile Devices Best Practices due to the rising threat of mobile malware.

Read More

Championing Security: Understanding CISA's Secure by Design Pledge

In this blog, Zimperium shares how CISA's Secure by Design pledge is an important step towards a more secure digital future.

Read More

The Crucial Need for Mobile Security in Retail Point of Sale Systems

In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.

Read More

The Multifaceted Threat Landscape of Mobile Security

In this blog, Zimperium shares how the multifaceted threat landscape of mobile security expands beyond the SS7 protocol.

Read More

Building a Robust Foundation: How to Build a Strong Application Security Posture

In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.

Read More

White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications

Cryptography is routinely used to ensure data integrity and confidentiality. Yet, cryptographic protection is only as strong as the security of the used cryptographic keys.

Read More

Every Industry's Battle: The Threat of Mobile Malware on the Enterprise

Our research also shows that the 29 malware families we highlighted in the Heist report also target 478 non-banking mobile applications across 32 categories. 

Read More

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

In this blog, we delve into the multifaceted challenges of updating software safely and efficiently, particularly when high-impact vulnerabilities are at stake.

Read More

Your new car may be safer and smarter, but is it cyber-secure?

The auto industry reached an important milestone in 2020: more than half of the cars sold globally included internet connectivity as a standard feature.

Read More

More Malware May be Exposed to iOS Devices Because of Supreme Court Ruling

According to The Wall Street Journal’s article Apple Loses Bid to End App Antitrust Case in Supreme Court, “Consumers can sue Apple Inc. for forcing them

Read More

Webinar Series: May is EMM Month

Webinars to focus on Zimperium EMM partnerships, most effective ways to deliver advanced mobile threat detection. Zimperium webinars throughout May,

Read More

You May Want to Hold off on Saying “Cheese” for FaceApp

The latest security and privacy hysteria involving apps is “FaceApp” - - which may or may not upload all of your photos to a server owned by a Russian

Read More

Mobile Endpoint Security and Antivirus | Differences Between the Two

The challenge with explaining something new is making that new thing relatable to something someone else already knows and understands. This is why the

Read More

Securing Your React Native Apps: Top 6 Concerns to Address

In mobile app development, there are two primary approaches: native apps and hybrid apps. Native apps are developed for specific platforms using languages

Read More

Mobile Banking and The Modern Day Bonnie and Clyde: Is Your App Safe?

We live in an era where our lives are intertwined with our devices. With the majority of banking transactions moving from physical to digital

Read More

Mobile Banking Fraud vs. Mobile Banking Scams: The Risks and Repercussions

For finance and security professionals, understanding the nuances between fraud and scams in the mobile banking sector is critical for protecting customer assets and safeguarding institutional integrity.

Read More

Mobile Device Management & Mobile Threat Defense: A Love Story

MDM and MTD were made for each other. It was love at first byte. Read the love story. Live the romance. Truly better together.

Read More

The Risks of Quishing and How Enterprises Can Stay Secure

Cybercriminals are exploiting QR codes through phishing attacks, called quishing, which are exposing employees and organizations to the risk  of data loss, credential theft, and unauthorized access to corporate networks.

Read More

IBM Security MaaS360 Announces Partnership with Zimperium

IBM Security joins forces with Zimperium to offer organizations a comprehensive solution to manage and protect their mobile ecosystem.

Read More

New Year, New Hires, New Devices: Kick Start the Year with Endpoint Security

As we welcome the new year, businesses around the world are gearing up for growth and expansion. Let’s dive into some of the threats mobile devices can face and explore how Zimperium Mobile Threat Defense (MTD) can help enterprises protect your enterprise. 

Read More

Mobile Banking Heists: The Emerging Threats and How to Respond

The past year has witnessed significant technological advancements in the banking and financial management which have greatly improved convenience for

Read More

Iranian Mobile Banking Malware Campaign Threat Continues

Research by Aazim Bill SE Yaswant and Vishnu Pratapagiri In July 2023, it was discovered that  an Android mobile campaign, which consisted of banking

Read More

Zimperium Takes on Mobile World Congress 2015

Next month Zimperium has the honor of presenting on the evolution of the mobile threat landscape at Mobile World Congress, March 2-5, in Barcelona, Spain.

Read More

Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

Mobile devices have become indispensable for Olympic teams, providing critical data for training, performance tracking, and real-time analysis. However, with the increasing reliance on mobile technology comes the pressing need for robust mobile security measures to protect sensitive data and ensure uninterrupted performance.

Read More

Mobile Security Predicted to be Fastest Growing Security Segment in 2021

According to Analysys Mason’s predictions for business connectivity, communications, IoT and security in 2021, mobile device security will be the fastest

Read More

Zimperium Impresses; Named Top Cybersecurity Startup for 2021

“So, get ready to be really impressed,” Max Kurton of EM360 - a global technology platform - exclaimed as he revealed Zimperium as the number one

Read More

Zimperium recognized in Gartner® Hype Cycle™ for Application Security 2023 for the third consecutive year

Learn why Zimperium has been recognized as a Sample Vendor for the 3rd consecutive year in the Gartner Hype Cycle for Application Security report.

Read More

Cutting through the Weekly Security Noise: Social, Payments and Apps Pose Big Enterprise Security Challenges in 2015

It’s a popular time of year for data about 2014 and prognostications for 2015. This week saw a number of stories citing data and trend information on how

Read More

Top 5 Mobile Security Stories of a Crazy 2020

2020 has been crazy… to say the least.  But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time - - mobile threats

Read More

Malicious WiFi Connections: Welcome to RSA Conference 2019

Nicolás Chiaraviglio (@chiconara) We recently blogged about attacks perpetrated at WiFi networks in Barcelona before and during the 2019 Mobile World

Read More

Top 5 Mobile Security Stories of 2019

Mobile security has certainly seen its fair share of headlines in 2019 prompting individuals and enterprises to realize mobile devices are another

Read More

Meet Zimperium at RSA Conference 2018

April 16 - 20, 2018. Moscone Center, San Francisco. The Zimperium team will be showcasing the latest in enterprise mobile security at RSAC 2018 and we

Read More

Modern Mobile Device Protection: Why Legacy Approaches Fall Short

There is no question that using mobile devices is an integral part of an organization's overall business strategy. As the mobile threat landscape continues to evolve, organizations must evaluate their current approaches and embrace new security practices in order to secure their mobile endpoints.

Read More

Zimperium Featured in Silicon Review’s Asian Edition of Top 10 Best Security Companies 2019

Silicon Review’s Asian Edition has named Zimperium to its list of top ten best security companies of 2019. The annual list appears in April’s Asian

Read More

Global Mobile Threat Report: Emerging Endpoint Security Risks in 2022

The ownership and use of smartphones has grown increasingly ubiquitous. By 2021, the percentage of adults in the U.S. who owned a smartphone grew to 85%1.

Read More

Half-Year Review: Emerging Mobile Threats and Key Trends in 2022

As the saying goes, time is money. While this does remain true, I’d also argue data is money. The mobile phones we carry in our pockets have quickly come

Read More

The Mobile Malware Chronicles: Necro.N - Volume 101

Zimperium researchers analyze Necro.N and focuses on the differences and elements.

Read More

Q&A with CISA’s Jen Easterly: Every Part Of Our Interconnected Ecosystem Needs Securing, Including Mobile

Jen Easterly, the new Director of the Cybersecurity & Infrastructure Security Agency CISA, recently sat down for a great, relaxed, and open discussion

Read More

2022 Recap: The Top Mobile Security Stories from Last Year

Over the course of 2022, a number of significant mobile security stories emerged. These events had a big impact last year, and they will certainly shape the security landscape that we must navigate as we enter 2023. Here is our take on the top mobile security stories that emerged in 2022.

Read More

Securing the Mobile-First Business

With the rise of the mobile-first business comes unique cybersecurity challenges. Learn the five principles for securing your mobile-first business.

Read More

Harnessing NIST Standards for Your Mobile-First Security Strategy

This webinar teaches how cybersecurity professionals rely on resources, such as NIST standards, to develop their mobile device security approach.

Read More

Secure Boston Helps Keep Mobile Devices Safe

Secure Boston keeps Boston residents' mobile devices safe with Wi-Fi network alerts, Android app safety, system tampering & phishing detection, and more.

Read More

Predator Spyware Strikes Again

On September 22nd, Citizen Lab, in collaboration with Google Project Zero, released a joint report revealing that Ahmen Eltantawy, a former Egyptian

Read More

Smashing Smishing with MTD

On September 04, The Hacker News reported on research published by Resecurity about a phishing campaign distributed through SMS (smishing). This campaign

Read More

Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques

On August 10, 2023, the U.S. Department of Homeland Security (DHS) released the Cyber Safety Review Board (CSRB) report summarizing the findings of its

Read More

Mobile Banking Malware, Regulation Stress & The Need for Adaptive Security

The rise of mobile banking malware has led to stringent banking security regulations and the need for adaptive security techniques that resolve evolving threats.

Read More

Mobile Ransomware - How Handheld and Mobile Devices Leave Organizations Exposed

In the era of the mobile-first business, learn how malicious actors are increasingly turning their focus to mobile ransomware.

Read More

From Mobile Security Penetration Tester to Zimperium Employee

Read Zimperium's Georgia Weidman's journey from mobile security pen tester to Zimperium Security Architect & mobile security superhero.

Read More

2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security

Download the 2023 Global Mobile Threat Report to learn more about the key findings and trends that shape today's mobile security landscape.

Read More

Don’t Kick Yourself Later for Not Knowing the Privacy and Security Risks of Your Mobile Apps Now

New reports are published every week about privacy and security problems affecting everyday consumers via mobile apps. FaceApp, the mobile app for iOS and

Read More

OilAlpha: Learn How Zimperium MTD Protects Against This New Threat

Learn about emerging threats from the OilAlpha group and how Zimperium MTD customers are protected against the OilAlpha group and other similar threats.

Read More

OWASP Mobile Top 10: Why OWASP Publishes A Separate List

Learn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.

Read More

BouldSpy: A New Android Surveillance Tool

Learn about BouldSpy, a newly discovered Android surveillance tool, and how Zimperium's on-device machine-learning technology can protect you.

Read More

Apple’s Move to Third-Party App Stores: How Developers Can Prepare

As Apple prepares to open iOS to third-party app stores, learn how developers can ensure their apps meet Apple’s stringent security & privacy standards.

Read More

Risky Apps: How They Can Pose Threats to Your Security

BYOD devices may include risky apps used for non-work purposes. These apps can create data protection risks that a mobile threat defense should address.

Read More

Securing Medical Devices & Their Connected Digital Health Apps

Connected medical devices are in increasing demand. Learn how building secure FDA-compliant digital health apps is key to securing medical devices.

Read More

A Comprehensive Guide to Mobile App Security

Learn about the most common mobile app attack vectors, how to prioritize mobile app security objectives, and development lifecycle best practices.

Read More

Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime

Sensitive financial data is shared online during tax season. Learn how to protect confidential tax information from cybercrime this tax season.

Read More

New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery

New Apple vulnerabilities have been disclosed. Learn the details, our conclusions, and some important lessons about mobile application security.

Read More

Lessons from The Recent Activision Hacker Attacks

Activision has been the victim of several malicious attacks recently. Read the security lessons learned & how to protect your mobile gaming apps.

Read More