Research
Apr 17, 2025
Abusing Data in the Middle: Surveillance Risks in China’s State-Owned Mobile Ecosystem
Aug 15, 2024
iVerify Discovers Android Vulnerability Impacting Millions of Pixel Devices Around the World
Jul 31, 2024
New Fileless Malware Framework "GhostHook" Targets Android Devices
Mar 25, 2024
Clipping Wings: Our Analysis of a Pegasus Spyware Sample
More Blogs
Feb 10, 2026
Breaking Down ZeroDayRAT - New Spyware Targeting Android and iOS
See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.
Feb 4, 2026
How Attackers Run Smishing Campaigns (And Why They Work)
See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.
Jan 20, 2026
iVerify Extends Cloudflare Integrations With WARP
See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.






