Mobile Banking Heists: The Emerging Threats and How to Respond

Mobile Banking Heists: The Emerging Threats and How to Respond

The past year has witnessed significant technological advancements in the banking and financial management which have greatly improved convenience for customers while also increasing security risks that should not be taken lightly. The financial industry has transformed mobile devices into a personal ATM for customers, offering services ranging from payments to cryptocurrencies, banking to investments….

Unveiling the Persisting Threat: Iranian Mobile Banking Malware Campaign Extends Its Reach

Unveiling the Persisting Threat: Iranian Mobile Banking Malware Campaign Extends Its Reach

Research by Aazim Bill SE Yaswant and Vishnu Pratapagiri In July 2023, it was discovered that  an Android mobile campaign, which consisted of banking trojans, was targeting major Iranian banks. Zimperium’s research team recently found that the campaign not only remains active but also extended its capabilities. These newly found samples are completely undetected by the industry. At the same…

Addressing NIS2 Requirements: Why it’s Time to Get Ready Now

Addressing NIS2 Requirements: Why it’s Time to Get Ready Now

Regulatory mandates. Whatever you may think of their intention, execution, or implications, they’re a critical part of the landscape for security teams. This is particularly true for organizations based in the EU and for entities that do business with EU-based organizations. A new directive will be introduced within the next year that promises to have…

5 Key Principles for Securing Today’s Mobile-First Businesses

5 Key Principles for Securing Today’s Mobile-First Businesses

Businesses in a variety of sectors and industries are increasingly becoming mobile-powered. Through mobile devices and applications, organizations are delivering more convenience, boosting productivity, and speeding innovation. As such, we’re now seeing the rise of the mobile-first business. The emergence of the mobile-first business has fundamental implications for security teams. The explosive growth in mobile…

Leveraging NIST Standards to Streamline Your Mobile-First Security Strategy 

Leveraging NIST Standards to Streamline Your Mobile-First Security Strategy 

There is no doubt that mobile devices continue to play an increasingly important role in our daily lives. They’re the devices we use to connect with friends and family, stay informed, and be entertained. This shift towards mobile has prompted companies to transform into mobile-powered businesses. Users’ increased reliance on mobile devices has introduced growing…

Keep Residents’ Mobile Devices Safe with Secure Boston

Keep Residents’ Mobile Devices Safe with Secure Boston

In our increasingly connected world, mobile devices have become essential tools for both personal and professional activities. These devices (like smartphones, tablets, and Chromebooks) store sensitive information, grant access to financial accounts, and connect us with loved ones. As our reliance on mobile devices grows, so does the importance of mobile security. Just in time…

Transforming Identity-Based Security with Zimperium Mobile Threat Defense and Okta Identity Threat Protection Platform

Transforming Identity-Based Security with Zimperium Mobile Threat Defense and Okta Identity Threat Protection Platform

Mobile devices are an integral part of today’s organizations and our daily digital lives. As these devices continue to proliferate across users and enterprises, our endpoint attack surface is expanding as well, presenting a sprawl that security teams are scrambling to cover and protect. According to Zimperium’s 2023 Global Mobile Threat Report, 80% of phishing attacks…

Predator Spyware Strikes Again

Predator Spyware Strikes Again

On September 22nd, Citizen Lab, in collaboration with Google Project Zero, released a joint report revealing that Ahmen Eltantawy, a former Egyptian member of parliament, was targeted using highly sophisticated spyware. The recent payload obtained and analyzed by Citizen Lab matches the findings reported in a previous report, confirming that the tool used was Predator spyware, a software tool…

Smashing Smishing with MTD

Smashing Smishing with MTD

On September 04, The Hacker News reported on research published by Resecurity about a phishing campaign distributed through SMS (smishing). This campaign is targeting US citizens. The key elements of these campaigns are:  Zimperium’s research team is constantly monitoring newly registered domains in order to detect those that could be used to perform phishing attacks. These domains are detected…