Events

What You Will Learn:

  • Mobile devices are now the least protected endpoint in the enterprise.

  • See a real-world example: How the Coruna exploit kit shows nation-state-level tools are now being used for mass exploitation against ordinary users.

  • Early mobile malware like Cabir and iKee set the stage for modern threats.

  • Adversaries target mobile via Smishing and SIM swaps to bypass 2FA.

  • You must apply the same rigor to mobile as you do to desktop security.

  • How to integrate mobile threat telemetry into your SOC operations.

Meet the Speaker

Dr. Danny Rogers

Dr. Danny Rogers is the CEO and Co-Founder of iVerify, a mobile threat hunting company. Before this, he was a Former Program Manager at JHU/APL in Cyber and Information Operations and the Former Founder and CEO of Terbium Labs, which is now part of Deloitte. He holds a PhD in Quantum Cryptography from the University of Maryland.

How Mobile Devices Became Threats Hiding in Plain Sight

Mobile devices have become the new primary attack surface in the enterprise, shifting from a minor concern to the least-protected endpoint carrying the most risk. Our research confirms that the sophistication of mobile exploitation has escalated, with tools once reserved for nation-state espionage now being used against mass audiences. Ignoring this reality leaves a massive, unaddressed gap in corporate defense.

Attend this webinar to understand the fast evolution of mobile threats, from early malware to sophisticated, nation-state-level commercial spyware. Learn how to integrate critical mobile threat telemetry into your existing security operations.

April 15, 2026

11:00 AM ET

Secure Your Spot!

What You Will Learn:

  • Mobile devices are now the least protected endpoint in the enterprise.

  • See a real-world example: How the Coruna exploit kit shows nation-state-level tools are now being used for mass exploitation against ordinary users.

  • Early mobile malware like Cabir and iKee set the stage for modern threats.

  • Adversaries target mobile via Smishing and SIM swaps to bypass 2FA.

  • You must apply the same rigor to mobile as you do to desktop security.

  • How to integrate mobile threat telemetry into your SOC operations.

Meet the Speaker

Dr. Danny Rogers

Dr. Danny Rogers is the CEO and Co-Founder of iVerify, a mobile threat hunting company. Before this, he was a Former Program Manager at JHU/APL in Cyber and Information Operations and the Former Founder and CEO of Terbium Labs, which is now part of Deloitte. He holds a PhD in Quantum Cryptography from the University of Maryland.

How Mobile Devices Became Threats Hiding in Plain Sight

Mobile devices have become the new primary attack surface in the enterprise, shifting from a minor concern to the least-protected endpoint carrying the most risk. Our research confirms that the sophistication of mobile exploitation has escalated, with tools once reserved for nation-state espionage now being used against mass audiences. Ignoring this reality leaves a massive, unaddressed gap in corporate defense.

Attend this webinar to understand the fast evolution of mobile threats, from early malware to sophisticated, nation-state-level commercial spyware. Learn how to integrate critical mobile threat telemetry into your existing security operations.

April 15, 2026

11:00 AM ET

Secure Your Spot!