Zimperium Blog

Mobile Application Protection Suite (MAPS)

Zimperium's MAPS is the world's only complete platform for DevSecOps teams to build secure mobile apps.

Don’t Kick Yourself Later for Not Knowing the Privacy and Security Risks of Your Mobile Apps Now

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Read More

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Read More

Now Available: Integrate Mobile App Scans into CI/CD Pipeline Using GitHub Actions

Read More

Debunking Five Myths About Mobile Security

Read More

ISM’s Guidelines for Enterprise Mobility

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Read More

How Application Shielding Fits into the DevSecOps Framework 

Read More

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

Read More

A Network of Harm: Gigabud Threat and Its Associates

Read More

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Read More

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Read More

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

Read More

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

Read More

DAST Best Practices for Mobile Developers

Read More

Deep Dive into Phishing Chronology: Threats and Trends 

Read More

Dynamic Application Security Testing vs. Static Application Security Testing

Read More

Securing Agency Devices: The Critical Need for Mobile App Vetting

Read More

Integrating DAST in the Development Cycle

Read More

BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection

Read More

Top 7 Source Code Obfuscation Techniques

Read More

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Read More

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

Read More

Phishing Campaigns and Rafel RAT: A Dangerous Duo

Read More

Mobile Threat Detection (MTD)

Zimperium's MTD offers robust mobile security for enterprises, safeguarding both corporate and personal devices from advanced threats while ensuring privacy.

Rapid Response: Zimperium Detects GhostSpy Android RAT

Read More

Rapid Response: Zimperium Detects All Reported Samples of Evolving Zanubis Android Banking Trojan

Read More

Preventing Malicious Mobile Apps from Taking Over iOS through App Vetting

Read More

Securing Every Android Work Device: Zimperium and Android Enterprise Enable Smarter, Safer Access

Read More

From Lock Screen to Wallets: BTMOB RAT Now Targets Alipay PINs

Read More

Rapid Response: Zimperium Detects SuperCardX NFC Relay Fraud Operation

Read More

Your Apps are Leaking: The Hidden Data Risks on your Phone, Part 1

Read More

Pragmatic Crocodilus: A New Variant In the Horizon

Read More

2022 Predictions: 5 Mobile Threats to Look for This Year

Read More

Chrome OS Now Second-Most Popular Desktop Operating System

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Read More

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Read More

4 Reasons Why Companies Need To Protect Employee Phones Today

Read More

Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware

Read More

Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign

Read More

Expanding the Investigation: Deep Dive into Latest TrickMo Samples

Read More

ISM’s Guidelines for Enterprise Mobility

Read More

Zimperium’s Zero-Day Defense Against Octo2 Malware Targeting European Banks

Read More

iOS and the WebP Vulnerability

Read More

Zimperium Coverage on COLDRIVER Phishing Campaign 

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Read More

Read All

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.

Your Mobile App, Their Playground: The Dark side of the Virtualization

Read More

Privilege Escalation: Preventing Mobile Apps from Taking Over on Android

Read More

Rapid Response: Zimperium Detects GhostSpy Android RAT

Read More

Rapid Response: Zimperium Detects All Reported Samples of Evolving Zanubis Android Banking Trojan

Read More

Preventing Malicious Mobile Apps from Taking Over iOS through App Vetting

Read More

Securing Every Android Work Device: Zimperium and Android Enterprise Enable Smarter, Safer Access

Read More

Zimperium’s Takeaways from RSAC 2025: Addressing the Mobile Blind Spot

Read More

Your Apps Are Leaking: The Hidden Data Risks on Your Phone, Part 2

Read More

From Lock Screen to Wallets: BTMOB RAT Now Targets Alipay PINs

Read More

Rapid Response: Zimperium Detects SuperCardX NFC Relay Fraud Operation

Read More

Your Apps are Leaking: The Hidden Data Risks on your Phone, Part 1

Read More

Pragmatic Crocodilus: A New Variant In the Horizon

Read More

The Power of App Vetting: The First Line of Defense Against Enterprise Intruders

Read More

Zimperium’s Zero-Day Detection of Android Malware Using .NET MAUI Framework

Read More

Catch Me If You Can: Rooting Tools vs The Mobile Security Industry

Read More

Enhancing Mobile Security: Zimperium and CrowdStrike Expand Strategic Partnership

Read More

So You Think That Popular App is Safe? Think Again!

Read More

Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach

Read More

Zimperium’s Protection Against Tria Stealer’s SMS Data Theft

Read More

Zimperium’s Comprehensive Protection Against Fake SBI Reward Banking Trojan

Read More

Hidden in Plain Sight: PDF Mishing Attack

Read More

Zimperium’s Coverage Against Android Malware in Donot APT Operations and Extended Indicators of Compromise

Read More

How Zimperium Can Help With Advanced Spyware Such as NoviSpy

Read More

Mobile Spear Phishing Targets Executive Teams

Read More

Top 5 Cryptographic Key Protection Best Practices

Read More

Securing Mobile Devices and Apps: Critical Operational Resilience in Airlines

Read More

AppLite: A New AntiDot Variant Targeting Mobile Employee Devices

Read More

Top 5 Mobile Security Risks for Enterprises

Read More

Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025

Read More

2022 Predictions: 5 Mobile Threats to Look for This Year

Read More

Chrome OS Now Second-Most Popular Desktop Operating System

Read More

The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes

Read More

Browser-based CVE-2015-3864 Metasploit Module Now Available for Testing

Read More

Don’t Kick Yourself Later for Not Knowing the Privacy and Security Risks of Your Mobile Apps Now

Read More

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Read More

Addressing NIS2 Requirements: Why it's Time to Get Ready Now

Read More

The Critical Role of Supply Chain Resilience in Today's Digital Landscape

Read More

4 Reasons Why Companies Need To Protect Employee Phones Today

Read More

Now Available: Integrate Mobile App Scans into CI/CD Pipeline Using GitHub Actions

Read More

Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware

Read More

Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign

Read More

Debunking Five Myths About Mobile Security

Read More

Expanding the Investigation: Deep Dive into Latest TrickMo Samples

Read More

ISM’s Guidelines for Enterprise Mobility

Read More

Zimperium’s Zero-Day Defense Against Octo2 Malware Targeting European Banks

Read More

iOS and the WebP Vulnerability

Read More

Zimperium Coverage on COLDRIVER Phishing Campaign 

Read More

Zimperium Detects New Android Spyware Targeting South Korea

Read More

How Application Shielding Fits into the DevSecOps Framework 

Read More

Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status

Read More

Unlocking the Hidden Costs of Mobile App Security in Low-Code Development

Read More

A Network of Harm: Gigabud Threat and Its Associates

Read More

Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft

Read More

Preventing Infections of N-Day Exploits Delivered via Malicious Websites

Read More

Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking

Read More

Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India

Read More

DAST Best Practices for Mobile Developers

Read More

Deep Dive into Phishing Chronology: Threats and Trends 

Read More

Dynamic Application Security Testing vs. Static Application Security Testing

Read More

Securing Agency Devices: The Critical Need for Mobile App Vetting

Read More

Integrating DAST in the Development Cycle

Read More

BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection

Read More

Top 7 Source Code Obfuscation Techniques

Read More

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Read More

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

Read More

Zimperium is Named a Leader in the Forrester Wave™ for MTD

Read More

Zimperium Welcomes David Natker as VP of Global Partners and Alliances

Read More

Phishing Campaigns and Rafel RAT: A Dangerous Duo

Read More

Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks

Read More

Medusa Reborn: Zimperium’s Robust Defense

Read More

aLTEr: POC Exploit of LTE Layer Two

Read More

Unmasking Rafel RAT: Android Infiltration Campaign

Read More

Beyond the App Store: The Hidden Risks of Sideloading Apps

Read More

Emerging Trends of Binary Analysis

Read More

New Mobile Threat Alert - Operation Celestial Fore

Read More

Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots

Read More

Championing Security: Understanding CISA's Secure by Design Pledge

Read More

The Crucial Need for Mobile Security in Retail Point of Sale Systems

Read More

The Multifaceted Threat Landscape of Mobile Security

Read More

Building a Robust Foundation: How to Build a Strong Application Security Posture

Read More

White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications

Read More

Every Industry's Battle: The Threat of Mobile Malware on the Enterprise

Read More

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

Read More

Why Protecting Public Sector Personnel's Devices is Essential

Read More

Your new car may be safer and smarter, but is it cyber-secure?

Read More

More Malware May be Exposed to iOS Devices Because of Supreme Court Ruling

Read More

Webinar Series: May is EMM Month

Read More

You May Want to Hold off on Saying “Cheese” for FaceApp

Read More

Turn On The Lights: Why Runtime Protection Matters for Mobile Apps

Read More

Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle

Read More

Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats

Read More

Mobile Endpoint Security and Antivirus | Differences Between the Two

Read More

Sophisticated Fake Apps: A Growing Concern

Read More

Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps

Read More

Securing Your React Native Apps: Top 6 Concerns to Address

Read More

The Growing Risks of On-Device Fraud

Read More

Mobile Banking and The Modern Day Bonnie and Clyde: Is Your App Safe?

Read More

Mobile Banking Fraud vs. Mobile Banking Scams: The Risks and Repercussions

Read More

Mobile Device Management & Mobile Threat Defense: A Love Story

Read More

The Risks of Quishing and How Enterprises Can Stay Secure

Read More

IBM Security MaaS360 Announces Partnership with Zimperium

Read More

New Year, New Hires, New Devices: Kick Start the Year with Endpoint Security

Read More

Mobile Banking Heists: The Emerging Threats and How to Respond

Read More

Iranian Mobile Banking Malware Campaign Threat Continues

Read More

Zimperium Takes on Mobile World Congress 2015

Read More

Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

Read More

Mobile Security Predicted to be Fastest Growing Security Segment in 2021

Read More

Zimperium Impresses; Named Top Cybersecurity Startup for 2021

Read More

Zimperium Selected CIO Applications Europe’s Top 10 Most Proficient Enterprise Mobility Solution Providers of 2019

Read More

Zimperium recognized in Gartner® Hype Cycle™ for Application Security 2023 for the third consecutive year

Read More

Cutting through the Weekly Security Noise: Social, Payments and Apps Pose Big Enterprise Security Challenges in 2015

Read More

Zimperium Recognized as a Top 25 Cybersecurity Company of 2019

Read More

Top 5 Mobile Security Stories of a Crazy 2020

Read More

MAPS Helps Enterprises Avoid Mobile Application Security Pitfalls

Read More

Malicious WiFi Connections: Welcome to RSA Conference 2019

Read More

Top 5 Mobile Security Stories of 2019

Read More

Meet Zimperium at RSA Conference 2018

Read More

Modern Mobile Device Protection: Why Legacy Approaches Fall Short

Read More

Zimperium Featured in Silicon Review’s Asian Edition of Top 10 Best Security Companies 2019

Read More

The Biggest Splash at BlackHat and DEFCON 2015

Read More

Global Mobile Threat Report: Emerging Endpoint Security Risks in 2022

Read More

Half-Year Review: Emerging Mobile Threats and Key Trends in 2022

Read More

The Mobile Malware Chronicles: Necro.N - Volume 101

Read More

Q&A with CISA’s Jen Easterly: Every Part Of Our Interconnected Ecosystem Needs Securing, Including Mobile

Read More

Join Zimperium at AirWatch Connect 2015

Read More

Detection of TowelRoot & Exploits of CVE-2014-3153

Read More

2022 Recap: The Top Mobile Security Stories from Last Year

Read More

Securing the Mobile-First Business

Read More

Harnessing NIST Standards for Your Mobile-First Security Strategy

Read More

Secure Boston Helps Keep Mobile Devices Safe

Read More

Okta Identity Threat Protection Platform

Read More

Predator Spyware Strikes Again

Read More

Smashing Smishing with MTD

Read More

Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques

Read More

Mobile Banking Malware, Regulation Stress & The Need for Adaptive Security

Read More

Unsupported Compression Methods Enable Android Malware to Bypass Detection

Read More

Mobile Ransomware - How Handheld and Mobile Devices Leave Organizations Exposed

Read More

From Mobile Security Penetration Tester to Zimperium Employee

Read More

2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security

Read More

OilAlpha: Learn How Zimperium MTD Protects Against This New Threat

Read More

OWASP Mobile Top 10: Why OWASP Publishes A Separate List

Read More

NIS2 - Applying the New NIS Directive to Mobile Devices

Read More

BouldSpy: A New Android Surveillance Tool

Read More

Apple’s Move to Third-Party App Stores: How Developers Can Prepare

Read More

Meet Grant Goodes, Zimperium Innovation Architect

Read More

Kimsuky Threat Actor Churns Out Advanced Malware

Read More

Risky Apps: How They Can Pose Threats to Your Security

Read More

Securing Medical Devices & Their Connected Digital Health Apps

Read More

Mobile Sypware Threats Put Businesses & Government Agencies at Risk

Read More

A Comprehensive Guide to Mobile App Security

Read More

Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime

Read More

New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery

Read More

Lessons from The Recent Activision Hacker Attacks

Read More

Zimperium Honored with Three Cybersecurity Excellence Awards

Read More

Zimperium Named in Top 20 Coolest Endpoint and Managed Security Companies

Read More

NCCoE Issues New Guide for Deploying Zero Trust Architectures

Read More

The Security Gaps Left by EDR and How MTD Can Help

Read More

Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough

Read More

Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST

Read More

NCCoE’s Latest Guidelines for BYOD Security and Privacy

Read More

Why Multi-Factor Authentication (MFA) is Not Enough to Meet CMMC Requirements

Read More

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

Read More

Schoolyard Bully Trojan Facebook Credential Stealer

Read More

The Risks of Holiday Shopping and What to Do About Them

Read More

Zimperium Recognized for 2nd Year in a Row by Deloitte Technology Fast 500

Read More

The Case of Cloud9 Chrome Botnet

Read More

Device Attestation: A Key Capability for SoftPOS and High-Security Apps

Read More

RSA & Zimperium: Enhancing the Security of Multifactor Authentication

Read More

Zimperium Wins ‘Device Theft Prevention and Protection Solution of the Year’ in the 2022 Cybersecurity Breakthrough Awards

Read More

More Than MDM: Mobile Device Security for CMMC Compliance

Read More

Secure PIN-entry for PCI MPoC using Zimperium

Read More

We Smell A RatMilad Android Spyware

Read More

Mobile Attack Chains: The Real World Risks to Enterprise Security

Read More

Phishing Is On The Rise. Why You Need a Mobile Security Strategy

Read More

Zimperium to Absorb Trustonic Application Protection (TAP) Business to Further Enhance Their Suite of Mobile Application Protection Solutions

Read More

How Federal Agencies Should Prioritize and Address the Requirements Set forth by OMB

Read More

A Tale of Two Phishes: Lessons From The Twilio and Cloudflare SMS Spear Phishing Attacks

Read More

Zimperium Recognized Among the Fastest Growing Private Companies by Inc. Magazine

Read More

Zimperium is the Only Pure-Play Mobile Threat Defense Provider Recognized in New GigaOm Anti-Phishing Radar Report

Read More

Mobile Security Is Critical: Verizon’s Refreshed Outlook on the Need for Mobile Threat Defense

Read More

4 Common types of Malware and What's the Difference (Trojan, Spyware, Viruses, Ransomware)

Read More

How to Address the Mobile Security Implications Posed by the New mHealth Era

Read More

2022 Mobile Banking Heists: The Emerging Threats and How to Respond

Read More

Keeping Texas Secure: Zimperium Earns Highest Level of TX-RAMP Certification

Read More

NCCoE Guide on Zero Trust Architectures: Draft Released

Read More

ABCsoup: The Malicious Adware Extension with 350 Variants

Read More