An API key is probably the most common method used by developers to identify what is making the...
Blogs by Paulo Renato
Paulo Renato
Paulo Renato is known more often than not as paranoid about security. He strongly believes that all software should be secure by default. He thinks security should be always opt-out instead of opt-in and be treated as a first class citizen in the software development cycle, instead of an after thought when the product is about to be finished or released.
Mobile apps are becoming increasingly important in the strategy of any company. As a result,...
This walk-though will show us how simple it is to integrate Approov in a current API server using...
This walk-though will show us how simple it is to integrate Approov in a current API server using...
APIs are a necessary and central part of the strategy of any digital business that wants to stay...
In Why Exposed API Keys and Sensitive Data are Growing Cause for Concern, Janet Wagner points out...
Posts on
- API Security (159)
- Mobile App Authentication (93)
- Mobile App Development (82)
- Mobile Security (74)
- Threats (67)
- Mobile App Security (64)
- API Abuse (62)
- Integration (54)
- API Keys (52)
- API (47)
- MitM Attack (46)
- Bots (39)
- Business (38)
- Certificate Pinning (32)
- Reverse Engineering (31)
- Quickstart (23)
- App Attestation (21)
- Healthcare (21)
- TLS (21)
- Android (20)
- Backend (20)
- Repackaged Apps (20)
- Fintech (18)
- Mobile API Security (17)
- iOS (17)
- Scrapers (14)
- Mobility (13)
- RASP (13)
- Zero Trust (11)
- News (9)
- Android Security (8)
- Fake Accounts (8)
- Run-time Secrets Protection (8)
- Third Party APIs (8)
- Gaming and Gambling (7)
- Man-in-the-Middle attack (7)
- API Gateway (6)
- Account Hijacking (6)
- ReactNative (6)
- Automotive (5)
- HarmonyOS (5)
- Mobile Health (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Apple (4)
- Code Obfuscation (4)
- Google (4)
- OWASP (4)
- Retail (4)
- Aggregators (3)
- CheatingAsAService (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Token-Based API Access (3)
- Web Security (3)
- gRPC (3)
- App Store (2)
- Cloud (2)
- Cordova (2)
- Cross-Platform (2)
- Data Security (2)
- Huawei (2)
- Mobile Banking (2)
- Mobile Finance (2)
- Mobile Payment Security (2)
- Pentesting (2)
- Runtime Application Self-Protection (2)
- SDLC (2)
- AWS (1)
- Account Takeover (1)
- App Shielding (1)
- Aviation (1)
- BOLA (1)
- CNIL (1)
- Connected Cars (1)
- Credential Stuffing (1)
- DMCC (1)
- DeviceCheck (1)
- E-Commerce (1)
- Frida (1)
- Frontend (1)
- Google Play (1)
- SDK (1)
- Smartphone Act (1)
- WAAP (1)
- WAF (1)
- over-the-air updates (1)
Popular Posts
- How to Bypass Certificate Pinning with Frida on an Android App
- Revealing the Limitations of Apple DeviceCheck and Apple App Attest
- How to Extract an API Key from a Mobile App by Static Binary Analysis
- MitM Attacks on Android Apps: A Step-by-Step Guide Using Emulators
- Why Does Your Mobile App Need an API Key?
- Limitations of Google Play Integrity API vs. Approov Mobile Security
- Securing HTTPS with Certificate Pinning on Android
- How Poor API Security Led to Major Breaches in 2024
- 5 Threats to Mobile Games and 5 Essential Security Measures
- Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
- Protect Mobile API: Prevent Certificate Pinning Bypass with Approov
- Epic Games Won Against Google but Lost to Apple - What are the Implications?
- Bypassing Certificate Pinning
- Three Actions You Should Take Right Now to Stop Mobile MitM Attacks
- How to Ride the Bus for Free (Hackers Need Not Apply)
