A ‘nearly impossible to analyze’ version of the malware sports a bootkit and ‘steal-everything’ capabilities.
How to Defend Against Mobile App Impersonation
Cerberus last edited by
Despite tight security measures by Google/Apple, cybercriminals still find ways to bypass fake app checks to plant malware on mobile devices. Dave Stewart, CEO of Approov, discusses technical approaches to defense against this.