Posts about MAPS (4)

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

MTD
3 minutes
Jul 08, 2024
Rafel RAT is a type of malware that allows attackers to gain complete control over a victim's mobile device. Once installed, Rafel RAT can perform a
Read Full Post

Beyond the App Store: The Hidden Risks of Sideloading Apps

iOS & Android
13 minutes
Jun 19, 2024
Application sideloading opens the door to significant security vulnerabilities increasing the attack surface users are exposed to.
Read Full Post

Emerging Trends of Binary Analysis

iOS & Android
6 minutes
Jun 18, 2024
In this blog, Zimperium shares details about the mobile-targeted malware campaign named Operation Celestial Force, attributed to threat actors linked to Pakistan. Read the blog for more.
Read Full Post

The Crucial Need for Mobile Security in Retail Point of Sale Systems

iOS & Android
3 minutes
May 23, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post

The Multifaceted Threat Landscape of Mobile Security

iOS & Android
3 minutes
May 22, 2024
In this blog, Zimperium shares how the multifaceted threat landscape of mobile security expands beyond the SS7 protocol.
Read Full Post

Building a Robust Foundation: How to Build a Strong Application Security Posture

iOS & Android
5 minutes
May 21, 2024
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Read Full Post

White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications

iOS & Android
4 minutes
May 16, 2024
Cryptography is routinely used to ensure data integrity and confidentiality. Yet, cryptographic protection is only as strong as the security of the used cryptographic keys.
Read Full Post

Every Industry's Battle: The Threat of Mobile Malware on the Enterprise

iOS & Android
7 minutes
May 15, 2024
Our research also shows that the 29 malware families we highlighted in the Heist report also target 478 non-banking mobile applications across 32 categories. 
Read Full Post