2024-11-20 |
Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025 |
Zimperium |
|
2024-11-13 |
Mishing: The Rising Mobile Attack Vector Facing Every Organization |
Tim Roddy |
|
2024-10-30 |
Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware |
Fernando Ortega |
|
2024-10-22 |
Zimperium’s Zero-Day Protection Against Water Makara Spear-Phishing Campaign |
Nicolás Chiaraviglio |
|
2024-10-19 |
The Mobile Malware Chronicles: Necro.N – Volume 101 |
Rajat Goyal |
|
2024-10-17 |
Debunking Five Myths About Mobile Security |
Krishna Vishnubhotla |
|
2024-10-15 |
iOS and the WebP Vulnerability |
Antonio Nappa |
|
2024-10-12 |
Expanding the Investigation: Deep Dive into Latest TrickMo Samples |
Aazim Yaswant |
|
2024-10-10 |
ISM’s Guidelines for Enterprise Mobility |
Zimperium |
|
2024-10-07 |
Zimperium’s Zero-Day Defense Against Octo2 Malware Targeting European Banks |
Nicolás Chiaraviglio |
|
2024-10-02 |
Zimperium Coverage on COLDRIVER Phishing Campaign |
Santiago Rodriguez |
|
2024-09-27 |
Zimperium Detects New Android Spyware Targeting South Korea |
Nicolás Chiaraviglio |
|
2024-09-18 |
How Application Shielding Fits into the DevSecOps Framework |
Melissa Gaffney |
|
2024-09-17 |
Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status |
Zimperium |
|
2024-09-13 |
Unlocking the Hidden Costs of Mobile App Security in Low-Code Development |
Grant Goodes |
|
2024-09-12 |
A Network of Harm: Gigabud Threat and Its Associates |
zLabs |
|
2024-09-10 |
Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft |
Nicolás Chiaraviglio |
|
2024-09-10 |
Preventing Infections of N-Day Exploits Delivered via Malicious Websites: iOS and the WebP Vulnerability Patching Matter |
Nicolás Chiaraviglio |
|
2024-09-06 |
Preventing Infections of N-Day Exploits Delivered via Malicious Websites |
Nicolás Chiaraviglio |
|
2024-09-05 |
Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking |
Krishna Vishnubhotla |
|
2024-09-04 |
Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India |
Zimperium |
|
2024-09-04 |
DAST Best Practices for Mobile Developers |
Melissa Gaffney |
|
2024-08-26 |
Dynamic Application Security Testing vs. Static Application Security Testing |
Melissa Gaffney |
|
2024-08-20 |
Securing Agency Devices: The Critical Need for Mobile App Vetting |
Zimperium |
|
2024-08-19 |
Integrating DAST in the Development Cycle |
Melissa Gaffney |
|
2024-08-13 |
BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection |
zLabs |
|
2024-08-06 |
Top 7 Source Code Obfuscation Techniques |
Melissa Gaffney |
|
2024-07-30 |
Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans |
Jon Paterson |
|
2024-07-30 |
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps |
zLabs |
|
2024-07-29 |
Deep Dive into Phishing Chronology: Threats and Trends |
zLabs |
|
2024-07-25 |
Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics |
Krishna Vishnubhotla |
|
2024-07-23 |
Zimperium is Named a Leader in the Forrester Wave™ for MTD |
Melissa Gaffney |
|
2024-07-20 |
The Critical Role of Supply Chain Resilience in Today’s Digital Landscape |
Krishna Vishnubhotla |
|
2024-07-17 |
Zimperium Welcomes David Natker as VP of Global Partners and Alliances |
Zimperium |
|
2024-07-16 |
Phishing Campaigns and Rafel RAT: A Dangerous Duo |
Zimperium |
|
2024-07-08 |
Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks |
Zimperium |
|
2024-07-03 |
Medusa Reborn: Zimperium’s Robust Defense |
Nicolás Chiaraviglio |
|
2024-07-01 |
Unmasking Rafel RAT: Android Infiltration Campaign |
Melissa Gaffney |
|
2024-06-19 |
Beyond the App Store: The Hidden Risks of Sideloading Apps |
Juan Francisco Bertona |
|
2024-06-18 |
Emerging Trends of Binary Analysis |
Melissa Gaffney |
|
2024-06-14 |
New Mobile Threat Alert – Operation Celestial Fore |
Zimperium |
|
2024-06-12 |
Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots |
Zimperium |
|
2024-06-07 |
Championing Security: Understanding CISA’s Secure by Design Pledge |
Zimperium |
|
2024-05-22 |
The Multifaceted Threat Landscape of Mobile Security |
Nicolás Chiaraviglio |
|
2024-05-22 |
Building a Robust Foundation: How to Build a Strong Application Security Posture |
Melissa Gaffney |
|
2024-05-21 |
The Crucial Need for Mobile Security in Retail Point of Sale Systems |
Zimperium |
|
2024-05-16 |
White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications |
Atis Straujums |
|
2024-05-15 |
Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise |
Krishna Vishnubhotla |
|
2024-05-13 |
Patching High Impact Vulnerabilities: A Retrospective on WebP CVE |
Antonio Nappa |
|
2024-05-09 |
Why Protecting Public Sector Personnel’s Devices is Essential |
Kern Smith |
|
2024-04-29 |
Turn On The Lights: Why Runtime Protection Matters for Mobile Apps |
Jake VanAdrighem |
|
2024-04-17 |
Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle |
Monique Becenti |
|
2024-04-04 |
Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats |
Monique Becenti |
|
2024-04-04 |
Sophisticated Fake Apps: A Growing Concern |
Monique Becenti |
|
2024-04-04 |
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps |
Monique Becenti |
|
2024-04-04 |
Securing Your React Native Apps: Top 6 Concerns to Address |
Krishna Vishnubhotla |
|
2024-03-27 |
Sophisticated Fake Apps: A Growing Concern |
Monique Becenti |
|
2024-03-26 |
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps |
Monique Becenti |
|
2023-08-29 |
Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques |
Monique Becenti |
|
2023-08-24 |
Zimperium recognized in Gartner® Hype Cycle™ for Application Security 2023 for the third consecutive year |
Lisa Bergamo |
|
2023-08-22 |
Mobile Banking Malware and Regulation Stress the Need for Adaptive Security |
Krishna Vishnubhotla |
|
2023-08-18 |
Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection |
Fernando Ortega |
|
2023-08-17 |
Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection |
Fernando Ortega |
|
2023-08-09 |
Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware |
Monique Becenti |
|
2023-08-09 |
From Mobile Security Penetration Tester to Zimperium Employee |
Georgia Weidman |
|
2023-07-18 |
Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware |
Monique Becenti |
|
2023-07-07 |
Keep your Employees Cyber Safe this Summer |
|
|
2023-07-06 |
Keep your Employees Cyber Safe this Summer |
|
|
2023-07-06 |
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security |
Monique Becenti |
|
2023-07-06 |
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy |
Nicolás Chiaraviglio |
|
2023-07-06 |
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? |
Krishna Vishnubhotla |
|
2023-07-06 |
The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices |
|
|
2023-07-06 |
BouldSpy: A New Android Surveillance Tool |
|
|
2023-07-06 |
Apple’s Move to Third-Party App Stores: How Developers Can Prepare |
|
|
2023-07-06 |
Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare |
|
|
2023-07-06 |
Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware |
|
|
2023-07-05 |
From Mobile Security Penetration Tester to Zimperium Employee |
Georgia Weidman |
|
2023-06-28 |
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security |
Monique Becenti |
|
2023-05-19 |
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy |
Nicolás Chiaraviglio |
|
2023-05-17 |
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? |
Krishna Vishnubhotla |
|
2023-05-08 |
The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices |
Ashish Patel |
|
2023-05-04 |
BouldSpy: A New Android Surveillance Tool |
Nicolás Chiaraviglio |
|
2023-04-28 |
Apple’s Move to Third-Party App Stores: How Developers Can Prepare |
Krishna Vishnubhotla |
|
2023-04-25 |
Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare |
JT Keating |
|
2023-04-20 |
Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware |
Nicolás Chiaraviglio |
|
2023-04-15 |
Risky Business: How Mobile Apps Can Pose Threats to Your Organization |
Monique Becenti |
|
2023-04-14 |
Risky Business: How Mobile Apps Can Pose Threats to Your Organization |
Monique Becenti |
|
2023-04-14 |
Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity |
Krishna Vishnubhotla |
|
2023-04-14 |
The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed |
Shridhar Mittal |
|
2023-04-14 |
From Development to Deployment: A Comprehensive Guide to Mobile App Security |
Lisa Bergamo |
|
2023-04-14 |
Taxed Not Hacked: Preparing for the Risks this Tax Season |
Monique Becenti |
|
2023-04-14 |
New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery |
Sammie Walker |
|
2023-04-14 |
Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks |
Monique Becenti |
|
2023-04-14 |
Zimperium Honored with Three Cybersecurity Excellence Awards |
Lisa Bergamo |
|
2023-04-05 |
Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity |
Krishna Vishnubhotla |
|
2023-03-30 |
The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed |
Shridhar Mittal |
|
2023-03-25 |
From Development to Deployment: A Comprehensive Guide to Mobile App Security |
Lisa Bergamo |
|
2023-03-23 |
Taxed Not Hacked: Preparing for the Risks this Tax Season |
Monique Becenti |
|
2023-03-10 |
New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery |
Sammie Walker |
|
2023-03-10 |
Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks |
Monique Becenti |
|