You're Not Seeing Mobile Attacks & You Never Will Unless You Make This Change

Mobile attacks are invisible. Learn how to protect your organization.

Join Our Webinar April 25 | 10:00 - 10:30 a.m. CDT

Register Now

zLabs Advanced Research and Exploitation Team

The zLabs Advanced Research and Exploitation team is the world’s most qualified and talented collection of researchers focused 100% exclusively on mobile. With backgrounds at companies ranging from eBay and Samsung to Microsoft and Freescale, zLabs researchers are setting the bar for all others to reach. zLabs analysts discovered and documented attacks such as Stagefright on Android and zIVA on iOS, and responsibly disclosed more iOS and Android vulnerabilities in 2017 than all other major competitors combined.

Awards & Recognition

The team's awards, certifications, specialized training and recognition are unparalleled in mobile security. Here is just a subset:

Adobe Independent Security Researchers
Adobe Independent Security Researchers
AT&T Bug Bounty Hall of Fame
AT&T Bug Bounty Hall of Fame
Barracuda Networks BugBounty Hall of Fame
Barracuda Networks BugBounty Hall of Fame
BitDefender Hall of Fame
BitDefender Hall of Fame
Hack in the Box 2017 Machine Learning Competition, 1st Prize
Hack in the Box 2017 Machine Learning Competition, 1st Prize
Certified Ethical Hacker
Certified Ethical Hacker
CoinBase BugBounty Hall of Fame
CoinBase BugBounty Hall of Fame
Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator
cPanel Full Disclosure
cPanel Full Disclosure
eBay Security Researchers
eBay Security Researchers
Certified Security Analyst
Certified Security Analyst
edX Certificate, Distributed Machine Learning with Apache Spark
edX Certificate, Distributed Machine Learning with Apache Spark
EKOPARTY CTF - 1st PLACE
EKOPARTY CTF - 1st PLACE
Envato Helpful Hacker
Envato Helpful Hacker
Friends of Offensive Security
Friends of Offensive Security
Google Application Security Hall of Fame
Google Application Security Hall of Fame
Kaneva Whitehat Hall of Fame
Kaneva Whitehat Hall of Fame
Microsoft Certified IT Professional Enterprise Administrator
Microsoft Certified IT Professional Enterprise Administrator
Microsoft Certified IT Professional Server Administrator
Microsoft Certified IT Professional Server Administrator
Microsoft Security Acknowledged Researchers
Microsoft Security Acknowledged Researchers
MIT: Tackling the Challenges of Big Data, Certificate
MIT: Tackling the Challenges of Big Data, Certificate
Nokia Responsible Disclosure Hall of Fame
Nokia Responsible Disclosure Hall of Fame
Olark Responsible Disclosure Program Special Thanks
Olark Responsible Disclosure Program Special Thanks
PayPal Wall of Fame, Top 10 Researchers
PayPal Wall of Fame, Top 10 Researchers
Stanford: Cryptography, Certificate
Stanford: Cryptography, Certificate
Stanford: Machine Learning, Certificate
Stanford: Machine Learning, Certificate
Twitter's Top Hackers on HackerOne
Twitter's Top Hackers on HackerOne
Zynga Security Whitehat Hall of Fame
Zynga Security Whitehat Hall of Fame
SANS GIAC Reverse Engineering Malware (GREM)
SANS GIAC Reverse Engineering Malware (GREM)
GIAC Mobile Device Security Analyst (GMOB)
GIAC Mobile Device Security Analyst (GMOB)

Awarded CVEs

In the last few years, zLabs has discovered and responsibly disclosed more mobile vulnerabilities than all other major competitors combined. Beginning in 2017, here is the growing list:

CVE Year Researcher Platform Severity
CVE-2018-4109 2018 Adam Donenfeld iOS Unassigned
CVE-2018-4087 2018 Rani Idan iOS Unassigned
CVE-2018-4095 2018 Rani Idan iOS Unassigned
CVE-2017-13253 2017 Tamir Zahavi Brunner Android Severe (TBD)
CVE-2017-6999 2017 Adam Donenfeld iOS 7.8
CVE-2017-6998 2017 Adam Donenfeld iOS 7.8
CVE-2017-6997 2017 Adam Donenfeld iOS 7.8
CVE-2017-6996 2017 Adam Donenfeld iOS 7.8
CVE-2017-6995 2017 Adam Donenfeld iOS 7.8
CVE-2017-6994 2017 Adam Donenfeld iOS 7.8
CVE-2017-6989 2017 Adam Donenfeld iOS 7.8
CVE-2017-6979 2017 Adam Donenfeld iOS 7.0
CVE-2017-5054 2017 Nicolas Trippar Android 8.8

Threat Blogs

For more, please visit https://blog.zimperium.com or sign up for our monthly threat newsletter.

Get the latest Cybersecurity News & Updates to your inbox