MDM - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – May 2025
    • News – April 2025
    • News – March 2025
    • News – February 2025
    • News – January 2025
    • News – December 2024
    • News – November 2024
    • News – October 2024
    • News – September 2024
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Tag: MDM

MobileIron enterprise MDM servers under attack from DDoS gangs, nation-states

Posted onOctober 21, 2020October 21, 2020

A month after details were published about three severe vulnerabilities in a type of server used to manage fleets of mobile devices, multiple threat actors are now exploiting these bugs to take over crucial enterprise servers and even orchestrate intrusions Read More …

CategoriesNews October 2020TagsCybercrime, DDoS, MDM, Threat Intelligence, TTPs

Upgraded Cerberus Spyware Spreads Rapidly via MDM

Posted onMay 1, 2020May 5, 2020

A newly discovered variant of the Cerberus Android trojan has been spotted, with vastly expanded and more sophisticated info-harvesting capabilities, and the ability to run TeamViewer. It was spotted by researchers being used in a targeted campaign on a multinational Read More …

CategoriesNews May 2020TagsCerberus, Cybercrime, Malware, Malware-as-a-Service - MaaS, MDM, Spyware, Threat Intelligence, TTPs

iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

Posted onJuly 25, 2018August 2, 2018

India-linked highly targeted mobile malware campaign, first unveiled two weeks ago, has been found to be part of a broader campaign targeting multiple platforms, including windows devices and possibly Android as well. As reported in our previous article, earlier this month researchers Read More …

CategoriesNews July 2018TagsHacking, iOS, MDM, Security, Vulnerability

LATEST ARTICLES


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS
Cyber Security Review online – August 2023


A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2025 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – May 2025
    • News – April 2025
    • News – March 2025
    • News – February 2025
    • News – January 2025
    • News – December 2024
    • News – November 2024
    • News – October 2024
    • News – September 2024
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise