Resources

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole […]

Read more

New iOS Jailbreak Tools put Organizations at Risk

According to iDownloadBlog.com (iDB), “in an unforeseen turn of events, hacker Pwn20wnd released v3.5.0 of the unc0ver jailbreak tool to the general public Sunday morning with official support for iOS 12.4, the latest available firmware release from Apple with support for Apple Card.”  While users wanting to bypass existing Apple […]

Read more

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the […]

Read more

To Be…Protected, or not To Be…Protected. That is the Question.

These last few days could have CIOs and CISOs very nervous. Two news stories about mobile devices pose real threats for enterprises around the world: From Forbes, “millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google’s own security research team.” Also from Forbes, […]

Read more

Mobile Is Another Endpoint: MITRE ATT&CK Framework for Mobile

  This is the second webinar in a two-part series on how two non-profit organizations, the Center for Internet Security (CIS) and MITRE have adapted best practice guidelines to include mobile. The first webinar focused on CIS’ 20 Critical Security Controls.  CISOs and CIOs know MITRE ATT&CK is a globally-accessible […]

Read more

Get started with Zimperium today