Posts about Threat Research (7)

The Case of Cloud9 Chrome Botnet

Threat Research
10 minutes
Nov 08, 2022
The Zimperium zLabs team recently discovered a malicious browser extension, originally called Cloud9, which not only steals the information available during the browser session but can also install malware on a user's device and subsequently assume control of the entire device. In this blog, we will take a deeper look into this malicious browser extension.
Read Full Post

We Smell A RatMilad Android Spyware

Android
9 minutes
Oct 05, 2022
The Zimperium zLabs research team discovered spyware targeting Middle Eastern enterprise mobile devices and began monitoring the activity of a novel Android spyware family that we have since named RatMilad. Learn how Zimperium zIPS customers are protected against RatMilad spyware. Read more.
Read Full Post

Mobile Attack Chains: The Real World Risks to Enterprise Security

Threat Research
6 minutes
Sep 28, 2022
Identifying a problem is a critical first step, but there can be a big leap between detecting an issue and fixing it. This is very much the case when it
Read Full Post

4 Common types of Malware and What's the Difference (Trojan, Spyware, Viruses, Ransomware)

Threat Research
8 minutes
Aug 02, 2022
Malware is malicious code that threat actors use to compromise data collected, stored, processed, or transmitted by mobile devices, computers, servers, or
Read Full Post

2022 Mobile Banking Heists: The Emerging Threats and How to Respond

Threat Research
3 minutes
Jul 22, 2022
The landscape of modern banking and financial management has evolved with the rise of digital access to assets on a global scale. From payments to
Read Full Post

ABCsoup: The Malicious Adware Extension with 350 Variants

Threat Research
10 minutes
Jul 07, 2022
What can ABCsoup do? Recently Zimperium discovered and began monitoring the growth of a wide range of malicious browser extensions with the same extension
Read Full Post

The State of Browser Extension Malware

Threat Research
11 minutes
Apr 07, 2022
It is time for us to change how we think about malware. No longer is it limited to one specific operating system or device type. Like with phishing
Read Full Post

The State of Mobile App Security: Key Takeaways from 2022 Threat Report

Threat Research
6 minutes
Mar 31, 2022
Over the last few years, a major shift has occurred in how we use mobile devices and apps. Fundamentally, we continue to use our smartphones more and
Read Full Post