Zimperium
Follow
1917 Followers
Follow Zimperium on their other social channels!
About Us
Founded:
2010
Company Size:
51-200 employees
Company Type:
Private
Location:
San Francisco, CA
Website:
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detecti ...
Read more
Promoted Content
451 SWOT Analysis, Zimperium Aims to Plug Mobile Security Leaks
Follow
8
NDAY-2017-0103: Arbitrary kernel write in sys_oabi_epoll_wait
By: Zuk AvrahamFollow Zuk Avraham (@ihackbanme) Nicolas TripparFollow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0103 CVE: CVE-2016-3857 Type: Elevation of Privileges Platform: Android < 6.0 Device type: Huawei MT7-UL00, Nexus 7 Zimperium protection: Detected the exploit without an update. Zimperium partners and customers do not need to take any action to detect this exploit on all affected devices. Android bulletin: https://source.android.com/security/bulletin/2016-08-01 ...
Follow
1
NDAY-2017-0101: iCloud Information Leak
By: Zuk AvrahamFollow Zuk Avraham (@ihackbanme) Nicolas TripparFollow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0101 CVE: Unknown Type: Information Disclosure Platform: iOS < 10.3 Device type: iPhone, iPod iOS bulletin: https://support.apple.com/en-us/HT207617 Public release date: 25th of May, 2017Credit: Anonymous Download Exploit (password zimperium_ndays) Vulnerability Details An XPC service com.apple.coreservices.appleid.authentication can be accessed by any app ...
Follow
1
NDAY-2017-0106: Elevation of Privilege in NVIDIA nvhost-vic driver
By: Zuk AvrahamFollow Zuk Avraham (@ihackbanme) Nicolas TripparFollow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0106 CVE: CVE-2016-2434 Type: Elevation of Privileges Platform: Android 6.0.1 Device type: Nexus 9 Zimperium protection: Detected the exploit without an update. Zimperium partners and customers do not need to take any action to detect this exploit on all affected devices. Android bulletin: https://source.android.com/security/bulletin/2016-05-01.html Public release date ...
Follow
17
Mobile Device Threat Data – Q1 2017
14% of Devices Contain Malware 4% detected a Man-in-the-Middle Attack 1 of 3 Devices Not Running Latest Version Mobile devices are now standard computing platforms in businesses of all sizes. U.S. consumers now spend over 5 hours per day on mobile devices [1]. The average time spent per day on mobile devices has increased every quarter since users prefer the ease of use and mobility.  As more time is spent on mobile, personal and company data (e.g., emails, contacts, calendars, documents, p ...
Follow
22
Enterprise Mobile Security on Microsoft Azure
Zimperium now integrates with Microsoft Azure to detect and thwart advanced mobile attacks. Our mobile threat defense (MTD) platform easily integrates directly with Microsoft Azure to give enterprise customers all of the benefits of Zimperium’s award-winning platform in the Azure Cloud. Zimperium on Azure delivers real-time, on-device threat detection and remediation for Android and iOS devices using our heralded z9 technology. Enterprises can now utilize existing available Azure resources ...
Follow
28
Mobile Security Perceptions vs. Reality
47% of cybersecurity professionals saw a year over year increase in mobile device threats We’ve teamed up with LinkedIn’s 350,000+ Information Security Community to bring you real answers on mobile security. Late last year, the Information Security Community launched its 2nd annual mobile security survey to find out what the community had to say about mobile devices. Over 1900 IT professionals responded to provide answers on mobile device vulnerabilities, mobile malware, network atta ...
Follow
NDAY-2017-0105: Elevation of Privilege Vulnerability in MSM Thermal Driver
By: Zuk AvrahamFollow Zuk Avraham (@ihackbanme) Nicolas TripparFollow Nicolas Trippar (@ntrippar) Following our announcement on the N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosure. We plan to release additional EOPs, RCEs and Infoleaks purchased through Zimperium N-Days EAP in the next few months. If y ...
Follow
NDAY-2017-0102: Elevation of Privilege Vulnerability in NVIDIA Video Driver
By: Zuk AvrahamFollow Zuk Avraham (@ihackbanme) Nicolas TripparFollow Nicolas Trippar (@ntrippar) Following our announcement on the N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosure. We plan to release additional EOPs, RCEs and Infoleaks purchased through Zimperium N-Days EAP in the next few months. If ...
Follow
Threat Research: FalseGuide
This Threat Research is about the recently (re)discovered “FalseGuide” threat found in Google Play. FalseGuide is a form of malware that has been hidden in more than 40 game guide apps in Google Play since February 2017. According to reports, approximately 600,000 devices may have been infected before the known versions of the malware were removed from Google Play. Newly infected apps were found in April and subsequently removed again, setting a pattern for additional infections to b ...
Follow
Reversing Android Applications 101 - Zimperium researcher @evilsocket provides a (relatively) easy and fun way to teach you how to reverse engineer Android applications. Check out his  “tricks” to reverse faster and more effectively. https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
Follow
1089
5 Facts Every Executive Should Know About Mobile Security
The Case for Mobile SecurityToday, employee mobility is critical for enterprise productivity. Mobile devices, the networks they use and apps are critical success factors to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.This connectivity opens the door to an entirely new category of security threats - Mobile Cyber Attacks. That’s why mobile device security and risk management is essential to any digital enterprise.Download the ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel