In this blog, Zimperium will explore the latest advancements in binary analysis, focusing on how AI, CI/CD pipelines, and a shift-left approach are reshaping the landscape.
In this blog, Zimperium will explore the latest advancements in binary analysis, focusing on how AI, CI/CD pipelines, and a shift-left approach are reshaping the landscape.
For finance and security professionals, understanding the nuances between fraud and scams in the mobile banking sector is critical for protecting customer assets and safeguarding institutional integrity.
As we welcome the new year, businesses around the world are gearing up for growth and expansion. Let’s dive into some of the threats mobile devices can face and explore how Zimperium Mobile Threat Defense (MTD) can help enterprises protect your enterprise.
Customers Offered Greater Visibility with Oracle Cloud Infrastructure Today, Zimperium – a leader in enterprise mobile security and a member of Oracle PartnerNetwork (OPN) – announced that we are collaborating with Oracle to offer our mobile threat defense (MTD) solutions on Oracle Cloud Infrastructure (OCI). We are working together with […]
It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no […]
2020 has been crazy… to say the least. But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time – – mobile threats are real and mobile devices and apps need protection. It truly is crazy how many stories we’ve seen – and […]
While leading organizations are actively protecting mobile endpoints, security teams haven’t had clean and scalable ways to integrate and correlate threat data with other parts of the security infrastructure. But that is changing. I recently hosted a webinar with David Branscome, Senior Cloud Solutions Architect, Microsoft and our very own […]
Recently, the Office of the Australian Information Commissioner (OAIC) published its periodic statistical report on data breaches – occurring in Australia during the first half of 2020 – received under the Notifiable Data Breaches (NDB) scheme. According to the report, there was a three percent decrease in the number of […]
** Update ** According to multiple reports, including Bloomberg (August 1) – “The alleged mastermind behind the July 15 hack of Twitter accounts of business titans, celebrities and a former president didn’t need sophisticated hacking tools to pierce the company’s security system. Rather, he convinced an information technology employee at […]
New Mobile Application Protection Suite (MAPS) Identifies Security, Privacy and Compliance Issues During Development and Protects Apps While In Use Mobile applications have become a business requirement for almost every organization. According to a recent report, four out of 10 large enterprises are planning to deliver more than 50 apps […]