Posts about MTD (7)

Mobile Sypware Threats Put Businesses & Government Agencies at Risk

Threat Research
4 minutes
Mar 29, 2023
Learn how increasing mobile spyware threats threaten businesses & government agencies and how mobile threat defense solutions can provide protection.
Read Full Post

Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime

Phishing
6 minutes
Mar 23, 2023
Sensitive financial data is shared online during tax season. Learn how to protect confidential tax information from cybercrime this tax season.
Read Full Post

New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery

iOS
5 minutes
Mar 09, 2023
New Apple vulnerabilities have been disclosed. Learn the details, our conclusions, and some important lessons about mobile application security.
Read Full Post

The Security Gaps Left by EDR and How MTD Can Help

MTD
6 minutes
Feb 02, 2023
Take a look at the emerging threats and uncover the shortcomings of enterprise detection and response (EDR) solutions in addressing these threats. Read on to learn why mobile threat defense (MTD) solutions represent a critical requirement for today’s enterprises. Learn more.
Read Full Post

Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough

CMMC
8 minutes
Jan 24, 2023
In order to comply with CMMC requirements, teams will need to institute robust mobile device security. In this post, we will provide some background on CMMC and why patching alone is not enough to meet these requirements. Learn more.
Read Full Post

Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST

Zimperium
4 minutes
Jan 11, 2023
In recent independent testing from AV-TEST, Zimperium’s mobile threat defense solution, zIPS, delivered top-tier results—better than 99% accuracy in about all scenarios. Read on to find out more about the tests and how zIPS fared. 
Read Full Post

Why Multi-Factor Authentication (MFA) is Not Enough to Meet CMMC Requirements

CMMC
6 minutes
Dec 22, 2022
As DIB contractors implement security controls aligned to CMMC practices, MTD is fundamental to securing CUI, especially for organizations with distributed workforces. Learn why MFA and other security practices are not enough to meet CMMC requirements.
Read Full Post

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

Threat Research
11 minutes
Dec 15, 2022
The Zimperium zLabs team recently discovered a Flutter application with malicious code. The Flutter-obfuscated malware campaign, MoneyMonger, is solely distributed through third-party app stores and sideloaded onto the victim’s Android device and most commonly take advantage of social engineering through phishing messages, compromised websites, rogue WiFi networks, and social media to distribute the download links. Read more to learn how Zimperium customers are protected.
Read Full Post