2024-04-29 |
Turn On The Lights: Why Runtime Protection Matters for Mobile Apps |
Jake VanAdrighem |
|
2024-04-17 |
Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle |
Monique Becenti |
|
2024-04-04 |
Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats |
Monique Becenti |
|
2024-04-04 |
Sophisticated Fake Apps: A Growing Concern |
Monique Becenti |
|
2024-04-04 |
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps |
Monique Becenti |
|
2024-04-04 |
Securing Your React Native Apps: Top 6 Concerns to Address |
Krishna Vishnubhotla |
|
2024-03-27 |
Sophisticated Fake Apps: A Growing Concern |
Monique Becenti |
|
2024-03-26 |
Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps |
Monique Becenti |
|
2023-08-29 |
Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques |
Monique Becenti |
|
2023-08-24 |
Zimperium recognized in Gartner® Hype Cycle™ for Application Security 2023 for the third consecutive year |
Lisa Bergamo |
|
2023-08-22 |
Mobile Banking Malware and Regulation Stress the Need for Adaptive Security |
Krishna Vishnubhotla |
|
2023-08-18 |
Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection |
Fernando Ortega |
|
2023-08-17 |
Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection |
Fernando Ortega |
|
2023-08-09 |
Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware |
Monique Becenti |
|
2023-08-09 |
From Mobile Security Penetration Tester to Zimperium Employee |
Georgia Weidman |
|
2023-07-18 |
Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware |
Monique Becenti |
|
2023-07-07 |
Keep your Employees Cyber Safe this Summer |
|
|
2023-07-06 |
Keep your Employees Cyber Safe this Summer |
|
|
2023-07-06 |
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security |
Monique Becenti |
|
2023-07-06 |
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy |
Nicolás Chiaraviglio |
|
2023-07-06 |
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? |
Krishna Vishnubhotla |
|
2023-07-06 |
The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices |
|
|
2023-07-06 |
BouldSpy: A New Android Surveillance Tool |
|
|
2023-07-06 |
Apple’s Move to Third-Party App Stores: How Developers Can Prepare |
|
|
2023-07-06 |
Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare |
|
|
2023-07-06 |
Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware |
|
|
2023-07-05 |
From Mobile Security Penetration Tester to Zimperium Employee |
Georgia Weidman |
|
2023-06-28 |
2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security |
Monique Becenti |
|
2023-05-19 |
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy |
Nicolás Chiaraviglio |
|
2023-05-17 |
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? |
Krishna Vishnubhotla |
|
2023-05-08 |
The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices |
Ashish Patel |
|
2023-05-04 |
BouldSpy: A New Android Surveillance Tool |
Nicolás Chiaraviglio |
|
2023-04-28 |
Apple’s Move to Third-Party App Stores: How Developers Can Prepare |
Krishna Vishnubhotla |
|
2023-04-25 |
Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare |
JT Keating |
|
2023-04-20 |
Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware |
Nicolás Chiaraviglio |
|
2023-04-15 |
Risky Business: How Mobile Apps Can Pose Threats to Your Organization |
Monique Becenti |
|
2023-04-14 |
Risky Business: How Mobile Apps Can Pose Threats to Your Organization |
Monique Becenti |
|
2023-04-14 |
Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity |
Krishna Vishnubhotla |
|
2023-04-14 |
The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed |
Shridhar Mittal |
|
2023-04-14 |
From Development to Deployment: A Comprehensive Guide to Mobile App Security |
Lisa Bergamo |
|
2023-04-14 |
Taxed Not Hacked: Preparing for the Risks this Tax Season |
Monique Becenti |
|
2023-04-14 |
New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery |
Sammie Walker |
|
2023-04-14 |
Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks |
Monique Becenti |
|
2023-04-14 |
Zimperium Honored with Three Cybersecurity Excellence Awards |
Lisa Bergamo |
|
2023-04-05 |
Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity |
Krishna Vishnubhotla |
|
2023-03-30 |
The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed |
Shridhar Mittal |
|
2023-03-25 |
From Development to Deployment: A Comprehensive Guide to Mobile App Security |
Lisa Bergamo |
|
2023-03-23 |
Taxed Not Hacked: Preparing for the Risks this Tax Season |
Monique Becenti |
|
2023-03-10 |
New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery |
Sammie Walker |
|
2023-03-10 |
Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks |
Monique Becenti |
|
2023-03-08 |
Zimperium Honored with Three Cybersecurity Excellence Awards |
Lisa Bergamo |
|
2023-02-27 |
Zimperium Named in Top 20 Coolest Endpoint and Managed Security Companies |
Sammie Walker |
|
2023-02-27 |
NCCoE Issues New Guide for Deploying Zero Trust Architectures |
Jim Kovach |
|
2023-02-27 |
The Security Gaps Left by EDR and How MTD Can Help |
JT Keating |
|
2023-02-22 |
Zimperium Named in Top 20 Coolest Endpoint and Managed Security Companies |
Sammie Walker |
|
2023-02-03 |
NCCoE Issues New Guide for Deploying Zero Trust Architectures |
Jim Kovach |
|
2023-02-02 |
The Security Gaps Left by EDR and How MTD Can Help |
JT Keating |
|
2023-01-26 |
Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough |
Jim Kovach |
|
2023-01-26 |
Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST |
Richard Melick |
|
2023-01-26 |
NCCoE’s Latest Guidelines for BYOD Security and Privacy |
Jim Kovach |
|
2023-01-24 |
Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough |
Jim Kovach |
|
2023-01-11 |
Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST |
Richard Melick |
|
2023-01-10 |
NCCoE’s Latest Guidelines for BYOD Security and Privacy |
Jim Kovach |
|
2023-01-07 |
2022 Recap: The Top Mobile Security Stories from Last Year |
Richard Melick |
|
2023-01-06 |
2022 Recap: The Top Mobile Security Stories from Last Year |
Richard Melick |
|
2023-01-05 |
Why Multi-Factor Authentication (MFA) is Not Enough to Meet CMMC Requirements |
Jim Kovach |
|
2022-12-22 |
Why Multi-Factor Authentication (MFA) is Not Enough to Meet CMMC Requirements |
Jim Kovach |
|
2022-12-22 |
MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter |
Fernando Ortega |
|
2022-12-15 |
MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter |
Fernando Ortega |
|
2022-12-13 |
Schoolyard Bully Trojan Facebook Credential Stealer |
Nipun Gupta |
|
2022-12-10 |
Medical data is moving to telemedicine, but security hasn’t kept up |
News ‧ Ashish Patel |
|
2022-12-10 |
Zimperium Reveals Details Of A Newly Discovered Android Threat Campaign That Has Been Stealing Facebook Credentials |
News ‧ Zimperium |
|
2022-12-10 |
Trojan Steals Facebook Details from Over 300K Victims |
News ‧ Zimperium |
|
2022-12-10 |
Zimperium Uncovers Facebook Credential Stealer Targeting Android Devices |
News ‧ Zimperium |
|
2022-12-09 |
Better Together: Why EDR Without MTD Leaves You Vulnerable to Attack |
Webinars ‧ Zimperium |
|
2022-12-06 |
City of Dallas Launches Free “Dallas Secure” Mobile Phone App Powered by Zimperium to Protect Residents from Cybersecurity Threats |
Press Releases ‧ JT Keating |
|
2022-12-06 |
MYPINPAD secures SoftPOS for PCI certification with Zimperium MAPS |
Case Studies ‧ Kasey Hewitt |
|
2022-12-05 |
The Mobile Security Imperatives for SoftPOS Providers — and How Zimperium Can Help |
Resources ‧ Kasey Hewitt |
|
2022-12-05 |
Gartner Hype Cycle for Application Security, 2022 |
Analyst Reports ‧ Kasey Hewitt |
|
2022-12-05 |
MYPINPAD secures SoftPOS for PCI certification with Zimperium MAPS |
Case Studies ‧ Kasey Hewitt |
|
2022-12-05 |
Applying OWASP’s Mobile App Security Guidance With Confidence |
Whitepapers ‧ Zimperium |
|
2022-12-05 |
Mobile Threat Patterns Across Sweden | 2022 Q3 Analysis |
Webinars ‧ Zimperium |
|
2022-12-05 |
Mobile Threat Patterns Across Australia | 2022 Q3 Analysis |
Webinars ‧ Zimperium |
|
2022-12-05 |
Mobile Threat Patterns Across Germany | 2022 Q3 Analysis |
Webinars ‧ Zimperium |
|
2022-12-05 |
Spyware for Sale: The Growing Threat to Mobile Security |
Webinars ‧ Zimperium |
|
2022-12-05 |
Mobile Threat Patterns Across the UK | 2022 Q3 Analysis |
Webinars ‧ Zimperium |
|
2022-12-01 |
Schoolyard Bully Trojan Facebook Credential Stealer |
Nipun Gupta |
|
2022-11-24 |
The Risks of Holiday Shopping and What to Do About Them |
Monique Becenti |
|
2022-11-24 |
Zimperium Recognized for 2nd Year in a Row by Deloitte Technology Fast 500 |
Shridhar Mittal |
|
2022-11-23 |
The Risks of Holiday Shopping and What to Do About Them |
Monique Becenti |
|
2022-11-16 |
Zimperium Recognized for 2nd Year in a Row by Deloitte Technology Fast 500 |
Shridhar Mittal |
|
2022-11-16 |
The Case of Cloud9 Chrome Botnet |
Nipun Gupta |
|
2022-11-08 |
The Case of Cloud9 Chrome Botnet |
Nipun Gupta |
|
2022-11-03 |
Modern Mobile Device Protection: Why Legacy Approaches Fall Short |
Monique Becenti |
|
2022-11-03 |
Device Attestation: A Key Capability for SoftPOS and High-Security Apps |
Tim Hartog |
|
2022-11-03 |
RSA & Zimperium: Enhancing the Security of Multifactor Authentication |
Nitin Bhatia |
|
2022-11-03 |
Zimperium Wins ‘Device Theft Prevention and Protection Solution of the Year’ in the 2022 Cybersecurity Breakthrough Awards |
JT Keating |
|
2022-11-03 |
More Than MDM: Mobile Device Security for CMMC Compliance |
Jim Kovach |
|
2022-11-03 |
Secure PIN-entry for PCI MPoC using Zimperium |
Tim Hartog |
|
2022-11-03 |
We Smell A RatMilad Android Spyware |
Nipun Gupta |
|