Posts about Threat Research (14)

Webinar: Why One of the World’s Largest Independent Energy Companies Is Implementing Mobile Threat Defense

Threat Research
1 minutes
Aug 09, 2018
Webinar reveals why leading critical national infrastructure enterprises are implementing mobile threat defense. Zimperium is providing mobile security
Read Full Post

zLabs at BSides Las Vegas: Where Android security helps and fails

Android
2 minutes
Aug 07, 2018
This week at BSides Las Vegas, zLabs' security researcher, Tamir Zahavi-Brunner (@tamir_zb) is conducting a session titled "Treble or Trouble: Where
Read Full Post

RAMpage: The Latest Rowhammer-esque Android Vulnerability

Android
3 minutes
Jun 29, 2018
On June 28th, a group of eight academics across three different universities released a research paper outlining a new Android vulnerability called
Read Full Post

ZipperDown Vulnerability: 100 Million iOS Users (Not Using Zimperium) at Risk of Exploit

Threat Research
2 minutes
May 18, 2018
Last Monday, security researchers from iOS jailbreak firm, Pangu Lab, announced a vulnerability that they believe affects around 10% of all iOS apps. In a
Read Full Post

CVE-2017-13253: Buffer overflow in multiple Android DRM services

Threat Research
17 minutes
Mar 15, 2018
Follow @tamir_zb As part of our platform research in Zimperium zLabs, we recently disclosed a buffer overflow vulnerability affecting multiple Android DRM
Read Full Post

Threat Advisory: RedDrop

Android
2 minutes
Mar 14, 2018
RedDrop is another in the long line of Android spyware apps. The malware has captured attention because of its ability to turn on microphones and
Read Full Post

Fake BBC News App: Analysis

Threat Research
6 minutes
Mar 01, 2018
Follow @fvrmatteo On February 26, 2018, we received a notification from the detection system about a malicious sample with a suspicious package and Play
Read Full Post

CVE-2018-4087 PoC: Escaping the sandbox by misleading bluetoothd

Threat Research
6 minutes
Feb 27, 2018
Following my previous blog post titled “New Crucial Vulnerabilities in Apple’s bluetoothd daemon”, I am releasing the vulnerability PoC. The PoC is
Read Full Post