Zimperium
Follow
1934 Followers
Follow Zimperium on their other social channels!
About Us
Founded:
2010
Company Size:
51-200 employees
Company Type:
Private
Location:
San Francisco, CA
Website:
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detecti ...
Read more
Promoted Content
451 SWOT Analysis, Zimperium Aims to Plug Mobile Security Leaks
Follow
11
Mobile Threat Data Q2 2017
Zimperium is releasing its most recent summarized mobile threat data detected via our global enterprise customers. The data provides insight into what type of threats our customers are detecting by having the zIPS mobile threat defense app on corporate and BYO devices. zIPS enables companies to detect threats to mobile devices in real-time, so attacks via mobile vectors stop at the device level and don’t advance beyond the targeted device. Our customers detected hundreds of thousands ...
Follow
18
Your Guide to Mobile Threat Defense
“The signs are clear that mobile threats can no longer be ignored. Security and risk management leaders must familiarize themselves with mobile threat defense solutions and plan to gradually integrate them to mitigate mobile risks.”* *Gartner Market Guide for Mobile Threat Defense Solutions, Dionisio Zumerle, John Girard, 22 August 2017 Gartner recently released its second Market Guide for Mobile Threat Defense (MTD) Solutions. In the document, Gartner provides an overview of mobile ...
Follow
45
ziVA: Zimperium’s iOS Video Audio Kernel Exploit
Follow @doadam Following my previous post, I’m releasing ziVA: a fully chained iOS kernel exploit that (should) work on all the iOS devices running iOS 10.3.1 or earlier. The exploit itself consists of multiple vulnerabilities that were discovered all in the same module: AppleAVEDriver. The exploit will be covered in depth in my HITBGSEC talk held on August 25th. For those of you who are not interested in iOS research and would like to protect themselves against these vulnerabilities, we u ...
Follow
48
Add Mobile Threat Defense to AirWatch at VMworld
We are sending a team to VMworld 2017 in Las Vegas for the first time. For years we have exhibited at AirWatch Connect and met many of our customers there for the first time and are excited to continue our partnership with VMware and AirWatch under the new integrated conference. We have been a part of VMware’s Mobile Security Alliance providing mobile threat defense for AirWatch customers to protect managed devices against device, network and app threats and are happy to int ...
Follow
81
Fake Snapchat in Google Play Store
Introduction   Zimperium discovered and reported a fake version of the popular Snapchat app in the official Google Play Store; At the time of our discovery, it was the second result when searching for “Snapchat”. The fake version of Snapchat app is using “Snap Inc .” as Company Name, with a  ” .” appended to original name. Fake Snapchat Metadata Application Name: ЅnарϲhаtCompany Name: Snap Inc .Package Name: com.snacha. ...
Follow
62
ZPI: One approach to rule them all
Introduction In 1975, a book was published that changed the way we approach complex problems. Inspired on how nature works “Adaptation in Natural and Artificial Systems” set the bases of genetic algorithms. The release date of this blogpost is strongly linked to that book, it is a symbolic tribute to its author, John Henry Holland, who passed out exactly two years ago. We strongly encourage everyone to embrace its legacy. Recently our CTO, Yaniv Karta, released a blog post about the ...
Follow
Jailbreak versus Compromise…
We see a lot of confusion in the market about precisely what it means to jailbreak a device–and that confusion could lead to serious problems, especially with regard to the notion of a hacker performing a jailbreak to attack a device. The security industry is notoriously full of acronyms, buzzwords and generally opaque jargon. Here at Zimperium, we try to keep technospeak to a minimum, although we don’t always succeed. Typically, the downside of throwing around technical terms is tha ...
Follow
Zimperium zLabs iOS Security Advisories
As part of zLab’s platform research team, I’ve tried to investigate an area of the kernel that wasn’t thoroughly researched before.  After digging into some of Apple’s closed-source kernel modules, one code chunk led to another and I’ve noticed a little-known module, which I’ve never seen before, called AppleAVE. AppleAVE was written neglecting basic security fundamentals, to the extent that the vulnerabilities described belo ...
Follow
104
zIPS and “Android for Work”
zIPS, the leading mobile threat defense solution, now provides tailored protection for Android for Work use cases. Enterprise IT and security professionals have been working with corporate end-users for decades to keep their desktops, laptops and servers secure. So you might think that those professionals would have a lock on what users will tolerate when it comes to securing corporate resources. Most of the hard-earned insights into end-user tolerance for security tools and policies can be thro ...
Follow
98
Zero Packet Inspection
Introduction In this blogpost I describe the history of z9, our detection engine. I will show its performance over reference data sets commonly used in the machine learning community. I’ll then describe how we apply it to detect networks attacks without any type of packet inspection. Eventually, we encourage you to participate by helping us gather and validate performance data from your own enterprise-grade network IPS. This data will be compared with our mobi ...
Follow
Reversing Android Applications 101 - Zimperium researcher @evilsocket provides a (relatively) easy and fun way to teach you how to reverse engineer Android applications. Check out his  “tricks” to reverse faster and more effectively. https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

A “Noob’s” Guide to Ransomware
Views: 3109 / September 23, 2017
Dark Network Guide!
Views: 4031 / September 22, 2017
UNM4SK3D: SEC, APT33, and CCleaner
Views: 2011 / September 22, 2017
Penetration Testing Flash Applications
Views: 2088 / September 22, 2017
Skip to toolbar
[close]
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel