Zimperium
Follow
1973 Followers
Follow Zimperium on their other social channels!
About Us
Founded:
2010
Company Size:
51-200 employees
Company Type:
Private
Location:
San Francisco, CA
Website:
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detecti ...
Read more
Promoted Content
Mobile Threat and Vulnerability Report
Follow
Webinar: Real World Examples of Mobile Threats Detected at a Hospital
Webinar reveals how hospitals and healthcare organizations can protect patient and company data with mobile threat defense. Zimperium is providing customers, media and the general public with a live webinar in which they will learn about the mobile threats hospitals and healthcare organizations are facing via a real-life example from a Zimperium customer. The webinar will review how these threats can gain access to sensitive patient and company data and how organizations can protect themselves a ...
Follow
FreeRTOS TCP/IP Stack Vulnerabilities Put A Wide Range of Devices at Risk of Compromise: From Smart
Researchers: Ori Karliner (@oriHCX) Relevant Operating Systems: FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), AWS FreeRTOS up to V1.3.1, WHIS OpenRTOS and SafeRTOS (With WHIS Connect middleware TCP/IP components) . CVE List: CVE Description CVE-2018-16522 Remote code execution ...
Follow
Answer: Yes. Question: Has there been a lot of recent news about mobile device attacks?
It seems like every day there is a news item about a recent breach or security incident relating to mobile.  Zimperium is in the business of protecting mobile devices and the data that resides on them or they have access to.  So, of course, we pay close attention to news and events surrounding the space.  In fact we’re often in the news thanks to our world class research team making some sort of discovery related to an unknown or unique mobile threat.  And while mo ...
Follow
Webinar: How a Company was Hacked with a Smartphone
Webinar reveals how a penetration tester proved that companies’ sensitive information can be accessed by hackers via a smartphone. Zimperium is providing customers, media and the general public with a live webinar in which they will learn how a company was hacked via a smartphone and how companies can protect their valuable assets and secure their mobile devices from hackers. The webinar will present a real-life example of a penetration (“pen”) tester who was hired by “Su ...
Follow
Zimperium Webinar: Real World Examples of Protecting City Government Employees from Mobile Threats
Webinar reveals how state and local governments can protect themselves with mobile threat defense. Zimperium is providing customers, media and the general public with a live webinar in which they will learn about the mobile threats facing state and local governments. The webinar will review how those threats, if gone undetected, can steal sensitive information and disrupt government business, and how state and local governments can protect themselves and their employees with mobile threat defens ...
Follow
Zimperium Webinar: Real World Examples of Defending Against Mobile Threats at Two International Fina
Webinar reveals how financial services firms can protect customers with mobile threat defense. Zimperium is providing customers, media and the general public with a live webinar in which they will learn about the threats two of Zimperium’s international banking customers encountered. The webinar will review how those threats, if gone undetected, can access highly sensitive data and how financial services firms can protect themselves and their customers with mobile threat defense. Zimperium ...
Follow
Zimperium Named Leader in Wireless, Mobile and Portable Device Security in 2018 Cyber Defense Global
Company recognized for leadership across multiple segments of security industry. Zimperium today announced that it has won the “Leader Wireless, Mobile, and Portable Device Security” award in the 2018 Cyber Defense Global Awards, a global awards program hosted by Cyber Defense Magazine which honors cyber defense and information security innovators. Zimperium was voted as the winner by a panel of judges, which was made up of certified security professionals, after their independent re ...
Follow
Zimperium Named “Overall Mobile Security Company of the Year” in 2018 CyberSecurity Breakthrough
Company honored for leadership in the mobile security industry in annual awards program for second consecutive year. Zimperium, the global leader in mobile threat defense (MTD), today announced that it has been named the winner of the “Overall Mobile Security Company of the Year” award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market. In last year’s inaugural ...
Follow
Webinar: Real World Examples of Protecting Client Data from Mobile Threats at an International Consu
Webinar reveals how consulting firms can protect client data with mobile threat defense. Zimperium is providing customers, media and the general public with a live webinar in which they will learn about the threats one of Zimperium’s international consulting firm customers encountered. The webinar will review how those threats, if gone undetected, can access highly sensitive data and how consulting firms can protect themselves and their clients with mobile threat defense. Zimperium executi ...
Follow
Fake Play Market: Zimperium’s z9 against Social Engineering Attack Vectors
Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Introduction Since the beginning of 2018, researchers in Zimperium’s zLabs have been tracking a rise in the frequency and sophistication of applications that have been loaded outside of the official Google Play Store. Many of these have leveraged social engineering techniques such as duplicate Play Stores. At the start of August, zLabs decided to take a look at some previously unknown malware samples that Zimp ...
Follow
Reversing Android Applications 101 - Zimperium researcher @evilsocket provides a (relatively) easy and fun way to teach you how to reverse engineer Android applications. Check out his  “tricks” to reverse faster and more effectively. https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel