Blog
Jun 25, 2025
iVerify and NetHope Partner to Advance Mobile Protection to Nonprofits Globally
Through its philanthropic arm, iVerify will provide its solution to protect journalists, activists and others in harm’s way.
Jun 18, 2025
Trust Broken at the Core
How Predator has evolved to infiltrate mobile systems and take advantage of vulnerabilities, with a comparative analysis between samples from 2021 and 2023.
Jun 5, 2025
iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S.
Examining a previously unknown iMessage vulnerability with possible exploitation in the US and EU
May 15, 2025
Anatomy of a Mobile Threat and the Impact of Lateral Movement
Anatomy of a Mobile Threat: Understanding the growing vulnerabilities associated with increased mobile device usage and the sophistication of mobile threats.
Apr 17, 2025
Abusing Data in the Middle: Surveillance Risks in China’s State-Owned Mobile Ecosystem
Data in the Middle uncovers state-owned mobile interconnect providers enable surveillance and cyber risks in global mobile signaling networks and the impact.
Mar 4, 2025
Why I Joined iVerify as CISO
Mike Rosen joins the iVerify as its CISO to contribute to crafting solutions that address real-world threats and help build a safer digital environment.