In this blog, Zimperium shares how CISA’s Secure by Design pledge is an important step towards a more secure digital future. Read the blog for more.
In this blog, Zimperium shares how CISA’s Secure by Design pledge is an important step towards a more secure digital future. Read the blog for more.
By focusing on robust security frameworks, continuous compliance, and cutting-edge protection technologies, retailers can not only provide convenience and efficiency but also maintain the trust and safety of their customers’ transactions. Read the blog for more.
In this blog, Zimperium explores the key elements that constitute a strong application security posture, underlining its critical role in developing and maintaining secure, compliant and trustworthy mobile applications for users worldwide.
Cryptography is routinely used to ensure data integrity and confidentiality. Yet, cryptographic protection is only as strong as the security of the used cryptographic keys.
Our research also shows that the 29 malware families we highlighted in the Heist report also target 478 non-banking mobile applications across 32 categories.
In mobile app development, there are two primary approaches: native apps and hybrid apps. Native apps are developed for specific platforms using languages like Swift for iOS and Kotlin for Android, offering fast performance and a smooth user experience. Hybrid apps, on the other hand, are built with web technologies […]
Read our blog that delves into the capabilities and dangers of the newly identified Android surveillance tool, BouldSpy, and emphasizes how Zimperium’s on-device machine learning technology can protect our customers from this threat.
The Zimperium zLabs research team discovered spyware targeting Middle Eastern enterprise mobile devices and began monitoring the activity of a novel Android spyware family that we have since named RatMilad. Learn how Zimperium zIPS customers are protected against RatMilad spyware. Read more.
Research by Aazim Bill SE Yaswant and Nipun Gupta While some financially motivated scams may seem simple on the surface, the truth of the matter is that cybercriminals are investing large amounts of money into strategies and infrastructure to scale up their malicious campaigns. Those investments are paying off as […]
A new Android Trojan codenamed FlyTrap has hit at least 140 countries since March 2021 and has spread to over 10,000 victims through social media hijacking, third-party app stores, and sideloaded applications. Zimperium’s zLabs mobile threat research teams recently found several previously undetected applications using Zimperium’s z9 malware engine and […]