Posts about MAPS (2)

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

MTD
2 minutes
Sep 17, 2024
Zimperium has achieved the Australian Government security status of  PROTECTED after successfully completing an assessment performed by the Information Security Registered Assessors Program (IRAP) for its sovereign-hosted Mobile Threat Defense (MTD) solution.
Read Full Post

A Network of Harm: Gigabud Threat and Its Associates

iOS & Android
3 minutes
Sep 12, 2024
This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 
Read Full Post

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Threat Research
2 minutes
Sep 09, 2024
Zimperium’s Zero-Day defense against a sophisticated Android malware campaign involving SpyAgent, a spyware strain designed to steal cryptocurrency credentials.
Read Full Post

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Threat Research
1 minutes
Sep 05, 2024
State-backed attackers and commercial surveillance vendors repeatedly using N-day exploits to target known vulnerabilities in devices. 
Read Full Post

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

iOS & Android
6 minutes
Sep 05, 2024
Mobile app developers committed to upholding the highest security standards are faced with several considerations when developing and maintaining banking apps. Learn more.
Read Full Post

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

MTD
2 minutes
Sep 04, 2024
As we continue to strengthen our presence in India and South Asia, we are excited to announce the appointment of Shashank Pathak to our Go-to-Market team.
Read Full Post

DAST Best Practices for Mobile Developers

iOS & Android
4 minutes
Sep 03, 2024
This blog post will guide you through the essential best practices for integrating DAST into your mobile development process.
Read Full Post

Deep Dive into Phishing Chronology: Threats and Trends 

iOS & Android
6 minutes
Aug 28, 2024
This article will focus on the Phishing Chronology. Analyzing 88014 phishing URLs collected from public sources and Zimperium data, we will show how dynamic and fast evolving are the phishing threats. 
Read Full Post