All posts tagged: advanced mobile threat defense

Predator Spyware Strikes Again

On September 22nd, Citizen Lab, in collaboration with Google Project Zero, released a joint report revealing that Ahmen Eltantawy, a former Egyptian member of parliament, was targeted using highly sophisticated spyware. The recent payload obtained and analyzed by Citizen Lab matches the findings reported in a previous report, confirming that […]

Read more

Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware

The Hacker News recently published a story that discussed a joint communication among the German intelligence apparatus, the Federal Office for the Protection of the Constitution (BfV), and South Korea’s National Intelligence Service (NIS), warning readers about new tactics used by a North Korean threat actor called Kimsuky. Learn more about Kimsuky and how Zimperium Mobile Threat Defense (MTD) customers are protected against these threats.

Read more

Risky Business: How Mobile Apps Can Pose Threats to Your Organization

Today, organizations need to mitigate threats arising from risky applications. While all third-party apps may not be malicious, they can lead to data loss and leakage. Learn how Zimperium MTD can help organizations identify which mobile devices have risky or banned apps and enable organizations to identify, block, and enforce policies to reduce the harm from risky apps to their business. Read more.

Read more

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

The Zimperium zLabs team recently discovered a Flutter application with malicious code. The Flutter-obfuscated malware campaign, MoneyMonger, is solely distributed through third-party app stores and sideloaded onto the victim’s Android device and most commonly take advantage of social engineering through phishing messages, compromised websites, rogue WiFi networks, and social media to distribute the download links. Read more to learn how Zimperium customers are protected.

Read more

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting traditional endpoints isn’t enough; how am I going to assess and protect my mobile devices?”   Threat visibility comes from sensors, and if your mobile devices don’t utilize […]

Read more

Get started with Zimperium today