top of page

GLOBAL THREAT BREAKDOWN

Updated: Oct 27, 2022



From a global perspective, there is no denying that mobile endpoints are exposed to increased threats, putting enterprise data and services at risk. Several observations emerge from the enterprise clients and the risk data reported back from the Android and iOS devices secured by Zimperium globally. To note, the data provided in these charts is inclusive of all threats and risks detected and prevented on Zimperium secured enterprise clients. This anonymized enterprise data also includes detected threats reported on installation as part of the visibility stage of deployment.

%23 encountered malware

%13 encountered man in the middle

%12 encountered a malicious website

%12 encountered scans

%8 encountered a known malicious network

%5 encountered traffic manipulation

%5 compromised devices

%3 encountered a rogue access point

%26 encountered a malicious website

%20 encountered malware

%17 encountered man in the middle

%9 encountered a known malicious network

%6 encountered scans

%4 compromised devices

%2 encountered traffic manipulation

%2 encountered a rogue access point




Breakdown of Exploited of 2021

Security teams fought against an increase in zero-day, or never-before-seen, exploited vulnerabilities across endpoint systems, including mobile Android and iOS systems. The increased growth of the mobile market has presented opportunities for malicious actors to exploit typically unsecured systems, with over 30% of known, zero-day vulnerabilities discovered in 2021 targeting mobile devices. This trend represents the most significant increase in zero-day exploits in the history of smartphones and tablets. Even Google’s Project Zero addressed this in a recent disclosure of multiple zero-day vulnerabilities.


These known CVEs put enterprises at risk by leaving gaps in systems. To complicate matters and environments further, manufacturers manage their security release cycle differently. Meanwhile, many older phones do not receive the newest updates, leaving them at risk to older, known vulnerabilities and easier targets by malicious actors.

5 views0 comments

Recent Posts

See All

Commentaires


bottom of page