HackDig : Dig high-quality web security articles for hacker

The State of the Cybersecurity Market: Where We’ve Come, Where We’re Going

There’s an interesting trend that I have personally noticed over the past few years: organizations are starting to take cybersecurity more seriously. With the multitude of high-profile data breaches, organizations are starting to realize that cybersecurity is a significant risk to the business. This allows CISOs and other similar titles with leadership respo
Publish At:2020-03-16 23:05 | Read:186 | Comments:0 | Tags:Cyber Security CISO cybersecurity risk

Zimperium Wins Multiple Cybersecurity Awards at RSA

Zimperium, the global leader in mobile threat defense (MTD), was presented with six awards during the RSA Conference this week.  The 2020 Cybersecurity Excellence Awards announced Zimperium as the Gold Winner in the Mobile Threat Defense (MTD) category, for zPlatform and Silver Winner in the Best Cybersecurity Company (100-499 employees). This is the fifth
Publish At:2020-02-26 11:40 | Read:343 | Comments:0 | Tags:Awards advanced mobile threat defense cyber security

Zimperium First to Integrate Mobile Threat Defense with Microsoft Azure Sentinel SIEM Solution

Zimperium now integrates with Endpoint Manager (formerly Intune), Microsoft Defender ATP, Azure Active Directory and Azure Sentinel SIEM In January, we announced our integration with the Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR) solution. Our mobile threat defense (MTD) integration with Microsoft Defender ATP
Publish At:2020-02-25 09:48 | Read:270 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

Zimperium Introduces Mobile Threat Advisory Services

Customized Threat Intelligence Reports Crafted by Mobile Security Experts Provides Meaningful, Actionable Insights for CISOs, CIOs and Security Operational Teams to Effectively Protect Enterprises   Data overload can cause security teams to feel overwhelmed and create desensitization to real threats. What’s more, analyzing mobile threat data to derive actio
Publish At:2020-02-24 10:22 | Read:238 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Zimperium Delivers Record Revenue in 2019 Marked by Triple Digit New Customer Growth, Innovative Product Enhancements an

Company Continues to Lead the Enterprise Mobile Threat Defense Market with Expansive Customer Growth, New Phishing Solutions and Partnerships with Google, Microsoft, VMware and Others  Zimperium, the global leader in enterprise mobile threat defense (MTD), finished 2019 with triple digit growth in new customer acquisitions, innovative product enhancements,
Publish At:2020-02-21 11:00 | Read:250 | Comments:0 | Tags:Mobile Threat Defense advanced mobile threat defense cyber s

Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreak

Organizers of Black Hat Asia and DEF CON China security conferences announced that they put the events on hold due to the Coronavirus outbreak. Bad news for cybersecurity passionates and experts, organizers of Black Hat Asia and DEF CON China security conferences announced last week that they have put the events on hold due to the Coronavirus outbreak.
Publish At:2020-02-16 12:17 | Read:476 | Comments:0 | Tags:Breaking News Hacking Security Black Hat Asia coronavirus cy

Zimperium’s “State of Enterprise Mobile Security” Report for 2019

It is no longer a matter of if or when an enterprise’s mobile endpoints are at risk of being attacked – – they already are; that according to findings in our “State of Enterprise Mobile Security” Report for 2019. Our research shows 100% of organizations protecting their mobile endpoints with Zimperium have detected and prevented threats an
Publish At:2020-02-05 19:10 | Read:295 | Comments:0 | Tags:App Security Mobile Security Mobile Threat Defense News adva

Dr. Jekyll and Mr. “Hide” – How Covert Malware Made it into Apple’s App Store

Today, enterprises feature a mixture of corporate and employee-owned mobile devices with the average individual downloading anywhere from 60 to 90 apps onto his/her mobile device. A fact keeping many CISOs up at night because while most apps are safe, even one malicious app – inadvertently downloaded – can compromise an entire organization.  The
Publish At:2020-02-04 12:25 | Read:432 | Comments:0 | Tags:News apps cyber security iOS

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with the Bluetooth function turned on.  This att
Publish At:2019-11-25 19:10 | Read:659 | Comments:0 | Tags:News cyber security mobile devices

Zimperium and Google Partner to Fight Bad Apps through App Defense Alliance

We are thrilled to announce Google has selected us to help ensure the safety of the millions of apps in the Google Play Store through its App Defense Alliance.    As a member of the App Defense Alliance, Google will provide us access to mobile apps as they are being queued to publish in the Google Play Store. Through our advanced machine learning-based z9 t
Publish At:2019-11-12 00:25 | Read:633 | Comments:0 | Tags:Android Machine Learning Mobile Malware Mobile Security News

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM (unified endpoint management) providers, including VMware’s Workspace ONE, to deliver sophisticated threat protection for mobile devices. We are able to detect threats and work with UEMs to remediate risks and
Publish At:2019-10-23 07:50 | Read:856 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Top Three Mobile Phishing Lures: #2) Malicious Apps

People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative and tricking users into giving their credentials when users think they’re just signing into their mobile app.  For example, BankBot is Android-targeting malware using fake overlay screens to mimic existing
Publish At:2019-10-09 07:50 | Read:778 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Top Three Mobile Phishing Lures: #1) Email

According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing actor, unprotected emails on a mobile device can easily turn into a new avenue for attack.”  Furthermore, it’s not just corporate email that you have to worry about. Users check their personal emails from
Publish At:2019-10-02 07:50 | Read:879 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of
Publish At:2019-09-19 14:33 | Read:906 | Comments:0 | Tags:Android App Security iOS Mobile Malware Mobile Security Mobi

The Bad, The Ugly & The Good of Mobile Phishing Protection

“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security.  Phishing has a very low barrier of entry, attacks can be
Publish At:2019-09-19 14:33 | Read:754 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat


Share high-quality web security related articles with you:)


Tag Cloud