Sophisticated Fake Apps: A Growing Concern

Sophisticated Fake Apps: A Growing Concern

March 27, 2024 Monique Becenti Share this blog Cybercriminals are employing increasingly sophisticated tactics to target unsuspecting users. One such tactic gaining traction is smishing – an attack that leverages text messages to deceive individuals into providing sensitive information or downloading malicious content. In this latest trend, cybercriminals create fake apps that mimic legitimate banking or financial services. These apps…

Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps

Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps

March 26, 2024 Monique Becenti Share this blog In today’s digitally-driven workplace, mobile applications (apps) have become indispensable tools for enhancing productivity and providing teams with seamless communication. As employees seek additional functionality and features beyond what official app stores offer, they often turn to third-party app stores. While the idea of third-party app stores may…

Top 7 Source Code Obfuscation Techniques

Top 7 Source Code Obfuscation Techniques

Every day the number and range of methodologies and malicious programs hackers use to gain unauthorized access to applications, devices, and personal information increases. Often software code itself provides the entry point for attack. According to the State of DevOps Report by Contrast Security, over 99% of technologists report that applications in production have a minimum of…

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

Executive Summary One-time passwords (OTPs) are designed to add an extra layer of security to online accounts, and most  enterprises have become very dependent upon them for controlling access to sensitive data and applications. However, these passwords are just as valuable to attackers. Mobile malware has become increasingly sophisticated, employing cunning tactics to steal these…

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

Leveraging Zimperium’s Zero-Day Detection to Combat OilAlpha’s Remote Access Trojans

In an era where mobile threats are increasingly sophisticated, the security landscape demands robust solutions capable of defending against the most advanced attacks. One such threat is the Remote Access Trojan (RAT), a type of malware designed to remotely control a mobile device, steal sensitive information, and manipulate device functions. The recent incidents involving the…

Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

As the world gathers for the 2024 Summer Olympics in Paris, the focus is not only on the athletes’ performances but also on the technology that supports them. Mobile devices have become indispensable for Olympic teams, providing critical data for training, performance tracking, and real-time analysis. However, with the increasing reliance on mobile technology comes…

Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise

Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise

May 15, 2024 Krishna Vishnubhotla Share this blog As we observed in our 2023 Mobile Banking Heists report, mobile banking apps have traditionally been a target for mobile malware due to the direct financial incentives for cybercriminals. But in today’s digital age, mobile applications have become the cornerstone of productivity, business growth, and user engagement in almost…

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

May 13, 2024 Antonio Nappa Share this blog Special thank you to Marina Caro who assisted in writing this blog. Patching alone isn’t enough to fix vulnerabilities Almost all mobile devices have at least one app with a critical vulnerability. Even if a patch is available, that critical vulnerability can leave the app and your data…

Why Protecting Public Sector Personnel’s Devices is Essential

Why Protecting Public Sector Personnel’s Devices is Essential

May 8, 2024 Kern Smith Share this blog Given our mobile-first lifestyle, cyber attackers are continuously honing their smishing strategies to exploit vulnerabilities, indiscriminately targeting government-issued and personal devices. The recent hack of Senator Lindsey Graham’s phone offers a critical case study, revealing how smishing attacks can successfully compromise personal devices with alarming consequences. Understanding the…

Turn On The Lights: Why Runtime Protection Matters for Mobile Apps

Turn On The Lights: Why Runtime Protection Matters for Mobile Apps

April 29, 2024 Jake VanAdrighem Share this blog It’s essential to recognize that security is not synonymous with knowing your threats. High-value software cannot be adequately protected by arbitrarily embracing code obfuscation and runtime protection alone. To achieve proper application security, you must ensure your protections act against active and relevant threats. Traditionally, businesses have safeguarded critical…