Posts about Threat Research (12)

WhatsApp Buffer Overflow Vulnerability Reportedly Exploited In The Wild

Threat Research
3 minutes
May 15, 2019
A new WhatsApp vulnerability has attracted the attention of the press and security professionals around the world. Zimperium zLabs will be creating a
Read Full Post

You’ve Just Won $1,000! Lucky You!

Threat Research
4 minutes
Apr 23, 2019
We’ve all seen them. They are annoying; can be abusive and sometimes malicious. It goes something like this: You’re navigating a web page to read an
Read Full Post

Zimperium Webinar Series: Seven Deadly (Mobile Security) Sins… According to CISOs

Android
1 minutes
Mar 08, 2019
Zimperium, a global leader in enterprise mobile threat defense (MTD) and a leading provider of real-time, on-device protection against known and unknown
Read Full Post

Machine Learning vs Signatures, Round N: Once Again, Zimperium Detects Malware No One Else Does

Android
9 minutes
Feb 28, 2019
Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo)     Advertising and click fraud campaigns are one of the most common
Read Full Post

The Other MWC, Revisited

Threat Research
3 minutes
Feb 27, 2019
Nicolás Chiaraviglio (@chiconara) (This post is a follow up of an earlier blog post) Last week, we released a blog warning about how hackers leverage
Read Full Post

Malicious WiFi Connections: The Other MWC

Threat Research
8 minutes
Feb 21, 2019
Nicolás Chiaraviglio (@chiconara) The GSMA Mobile World Congress, taking place every year in Barcelona, is undoubtedly the most important event for the
Read Full Post

Don't Give Me a Brake - Xiaomi Scooter Hack Enables Dangerous Accelerations and Stops for Unsuspecting Riders

Threat Research
3 minutes
Feb 12, 2019
This proof-of-concept (PoC) is released for educational purposes and evaluation by researchers, and should not be used in any unintended way. Furthermore,
Read Full Post

FreeRTOS TCP/IP Stack Vulnerabilities - The Details

Threat Research
13 minutes
Dec 04, 2018
Researcher: Ori Karliner (@oriHCX) Following our blog from last month, this blog will cover the technical details of our findings. If you suspect that any
Read Full Post