Zimperium Mobile Security Blog
订阅

近期历史最近 100 条记录

2024-09-18 How Application Shielding Fits into the DevSecOps Framework  Melissa Gaffney
2024-09-17 Zimperium Mobile Threat Defense (MTD) Achieves IRAP PROTECTED Status Zimperium
2024-09-13 Unlocking the Hidden Costs of Mobile App Security in Low-Code Development Grant Goodes
2024-09-12 A Network of Harm: Gigabud Threat and Its Associates zLabs
2024-09-10 Unmasking SpyAgent: Zimperium’s Zero-Day Defense Against Cryptocurrency Theft Nicolás Chiaraviglio
2024-09-10 Preventing Infections of N-Day Exploits Delivered via Malicious Websites: iOS and the WebP Vulnerability Patching Matter Nicolás Chiaraviglio
2024-09-06 Preventing Infections of N-Day Exploits Delivered via Malicious Websites Nicolás Chiaraviglio
2024-09-05 Safeguarding Financial Data: Essential Cybersecurity Practices for Mobile Banking Krishna Vishnubhotla
2024-09-04 Zimperium Welcomes Shashank Pathak to Our Go-to-Market Team in India Zimperium
2024-09-04 DAST Best Practices for Mobile Developers Melissa Gaffney
2024-08-26 Dynamic Application Security Testing vs. Static Application Security Testing Melissa Gaffney
2024-08-20 Securing Agency Devices: The Critical Need for Mobile App Vetting Zimperium
2024-08-19 Integrating DAST in the Development Cycle Melissa Gaffney
2024-08-13 BlankBot: A New Android Banking Trojan Cannot Evade on Device Machine Learning Protection zLabs
2024-08-06 Top 7 Source Code Obfuscation Techniques Melissa Gaffney
2024-07-30 Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans Jon Paterson
2024-07-30 Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps zLabs
2024-07-29 Deep Dive into Phishing Chronology: Threats and Trends  zLabs
2024-07-25 Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics Krishna Vishnubhotla
2024-07-23 Zimperium is Named a Leader in the Forrester Wave™ for MTD Melissa Gaffney
2024-07-20 The Critical Role of Supply Chain Resilience in Today’s Digital Landscape Krishna Vishnubhotla
2024-07-17 Zimperium Welcomes David Natker as VP of Global Partners and Alliances Zimperium
2024-07-16 Phishing Campaigns and Rafel RAT: A Dangerous Duo Zimperium
2024-07-08 Understanding Rafel RAT and Its Role in Mobile Ransomware Attacks Zimperium
2024-07-03 Medusa Reborn: Zimperium’s Robust Defense Nicolás Chiaraviglio
2024-07-01 Unmasking Rafel RAT: Android Infiltration Campaign Melissa Gaffney
2024-06-19 Beyond the App Store: The Hidden Risks of Sideloading Apps Juan Francisco Bertona
2024-06-18 Emerging Trends of Binary Analysis Melissa Gaffney
2024-06-14 New Mobile Threat Alert – Operation Celestial Fore Zimperium
2024-06-12 Mobile Security Alert: NSA Recommends Weekly Smartphone Reboots Zimperium
2024-06-07 Championing Security: Understanding CISA’s Secure by Design Pledge Zimperium
2024-05-22 The Multifaceted Threat Landscape of Mobile Security Nicolás Chiaraviglio
2024-05-22 Building a Robust Foundation: How to Build a Strong Application Security Posture Melissa Gaffney
2024-05-21 The Crucial Need for Mobile Security in Retail Point of Sale Systems Zimperium
2024-05-16 White-Box Cryptography: The Key to Safeguarding Sensitive Data in Mobile Applications Atis Straujums
2024-05-15 Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise Krishna Vishnubhotla
2024-05-13 Patching High Impact Vulnerabilities: A Retrospective on WebP CVE Antonio Nappa
2024-05-09 Why Protecting Public Sector Personnel’s Devices is Essential Kern Smith
2024-04-29 Turn On The Lights: Why Runtime Protection Matters for Mobile Apps Jake VanAdrighem
2024-04-17 Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle Monique Becenti
2024-04-04 Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats Monique Becenti
2024-04-04 Sophisticated Fake Apps: A Growing Concern Monique Becenti
2024-04-04 Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps Monique Becenti
2024-04-04 Securing Your React Native Apps: Top 6 Concerns to Address Krishna Vishnubhotla
2024-03-27 Sophisticated Fake Apps: A Growing Concern Monique Becenti
2024-03-26 Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps Monique Becenti
2023-08-29 Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques Monique Becenti
2023-08-24 Zimperium recognized in Gartner® Hype Cycle™ for Application Security 2023 for the third consecutive year Lisa Bergamo
2023-08-22 Mobile Banking Malware and Regulation Stress the Need for Adaptive Security Krishna Vishnubhotla
2023-08-18 Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection Fernando Ortega
2023-08-17 Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection Fernando Ortega
2023-08-09 Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware Monique Becenti
2023-08-09 From Mobile Security Penetration Tester to Zimperium Employee Georgia Weidman
2023-07-18 Held for Ransom: How Handheld and Mobile Devices Leave Organizations Exposed to Ransomware Monique Becenti
2023-07-07 Keep your Employees Cyber Safe this Summer
2023-07-06 Keep your Employees Cyber Safe this Summer
2023-07-06 2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security Monique Becenti
2023-07-06 Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy Nicolás Chiaraviglio
2023-07-06 OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? Krishna Vishnubhotla
2023-07-06 The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices
2023-07-06 BouldSpy: A New Android Surveillance Tool
2023-07-06 Apple’s Move to Third-Party App Stores: How Developers Can Prepare
2023-07-06 Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare
2023-07-06 Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware
2023-07-05 From Mobile Security Penetration Tester to Zimperium Employee Georgia Weidman
2023-06-28 2023 Global Mobile Threat Report: Key Insights on the State of Mobile Security Monique Becenti
2023-05-19 Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy Nicolás Chiaraviglio
2023-05-17 OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile? Krishna Vishnubhotla
2023-05-08 The EU’s NIS2: The New Cybersecurity Standards and How They Apply to Mobile Devices Ashish Patel
2023-05-04 BouldSpy: A New Android Surveillance Tool Nicolás Chiaraviglio
2023-04-28 Apple’s Move to Third-Party App Stores: How Developers Can Prepare Krishna Vishnubhotla
2023-04-25 Meet Grant Goodes, Zimperium’s Innovation Architect and Former Chief Scientist at Guardsquare JT Keating
2023-04-20 Kimsuky: Infamous Threat Actor Churns Out More Advanced Malware Nicolás Chiaraviglio
2023-04-15 Risky Business: How Mobile Apps Can Pose Threats to Your Organization Monique Becenti
2023-04-14 Risky Business: How Mobile Apps Can Pose Threats to Your Organization Monique Becenti
2023-04-14 Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity Krishna Vishnubhotla
2023-04-14 The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed Shridhar Mittal
2023-04-14 From Development to Deployment: A Comprehensive Guide to Mobile App Security Lisa Bergamo
2023-04-14 Taxed Not Hacked: Preparing for the Risks this Tax Season Monique Becenti
2023-04-14 New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery Sammie Walker
2023-04-14 Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks Monique Becenti
2023-04-14 Zimperium Honored with Three Cybersecurity Excellence Awards Lisa Bergamo
2023-04-05 Securing Medical Devices: The Critical Role of Mobile Apps in Ensuring Cybersecurity Krishna Vishnubhotla
2023-03-30 The Persistent Threat Posed by Mobile Spyware: How All Businesses and Government Agencies Continue to Be Exposed Shridhar Mittal
2023-03-25 From Development to Deployment: A Comprehensive Guide to Mobile App Security Lisa Bergamo
2023-03-23 Taxed Not Hacked: Preparing for the Risks this Tax Season Monique Becenti
2023-03-10 New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery Sammie Walker
2023-03-10 Hackers Go to War on Maker Of ‘Call Of Duty’: The Risks and How to Respond to The Recent Activision Attacks Monique Becenti
2023-03-08 Zimperium Honored with Three Cybersecurity Excellence Awards Lisa Bergamo
2023-02-27 Zimperium Named in Top 20 Coolest Endpoint and Managed Security Companies Sammie Walker
2023-02-27 NCCoE Issues New Guide for Deploying Zero Trust Architectures Jim Kovach
2023-02-27 The Security Gaps Left by EDR and How MTD Can Help JT Keating
2023-02-22 Zimperium Named in Top 20 Coolest Endpoint and Managed Security Companies Sammie Walker
2023-02-03 NCCoE Issues New Guide for Deploying Zero Trust Architectures Jim Kovach
2023-02-02 The Security Gaps Left by EDR and How MTD Can Help JT Keating
2023-01-26 Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough Jim Kovach
2023-01-26 Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST Richard Melick
2023-01-26 NCCoE’s Latest Guidelines for BYOD Security and Privacy Jim Kovach
2023-01-24 Complying with CMMC Configuration Management Requirements: Why Patching Isn’t Enough Jim Kovach
2023-01-11 Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST Richard Melick

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选

Sponsors

今日解忧 - 赛博修行,舒缓静心,21世纪解压神器!
今日历 - 全球最全的日历,日历届的航空母舰!
百晓生AI - 全能创作助手

猜你喜欢