Everything. If you are reading this, then it's probably because you are actively considering a...
Topic Fake Accounts
API abuse, when the API is used in an unexpected way, is a growing problem in software development...
Editor's note: This post was originally published in September 2021 in Threatpost.
Data breaches...
We have released a short video that demonstrates how fake apps can be used to commit fraud against...
Remember Pokémon Go, the location-based augmented reality mobile game from Niantic Labs that...
As mobile apps become increasingly paramount to operating successfully in today’s markets, a big...
“It's the wave of the future,” declared the US State of West Virginia's Secretary of State of...
Our first batch of business level attacks are Data Scrapers and Account Hijack. We also take a...
Posts on
- API Security (153)
- Mobile App Authentication (92)
- Mobile App Development (82)
- Mobile Security (76)
- Threats (67)
- API Abuse (62)
- Mobile App Security (58)
- Integration (54)
- API Keys (50)
- API (49)
- MitM Attack (45)
- Bots (39)
- Business (39)
- Certificate Pinning (31)
- Reverse Engineering (31)
- Quickstart (23)
- TLS (21)
- Android (20)
- Backend (20)
- Healthcare (20)
- Repackaged Apps (20)
- Fintech (18)
- iOS (17)
- Scrapers (14)
- App Attestation (13)
- Mobile API Security (13)
- Mobility (13)
- RASP (11)
- News (9)
- Android Security (8)
- Fake Accounts (8)
- Third Party APIs (8)
- Gaming and Gambling (7)
- Zero Trust (7)
- API Gateway (6)
- Account Hijacking (6)
- Man-in-the-Middle attack (6)
- ReactNative (6)
- HarmonyOS (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Apple (4)
- Google (4)
- Mobile Health (4)
- OWASP (4)
- Retail (4)
- Run-time Secrets Protection (4)
- Aggregators (3)
- Automotive (3)
- CheatingAsAService (3)
- Code Obfuscation (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Web Security (3)
- gRPC (3)
- App Store (2)
- Cloud (2)
- Cordova (2)
- Cross-Platform (2)
- Huawei (2)
- Mobile Finance (2)
- Mobile Payment Security (2)
- Pentesting (2)
- SDLC (2)
- Token-Based API Access (2)
- AWS (1)
- Account Takeover (1)
- App Shielding (1)
- BOLA (1)
- Connected Cars (1)
- Credential Stuffing (1)
- DMCC (1)
- Data Security (1)
- DeviceCheck (1)
- E-Commerce (1)
- Frida (1)
- Frontend (1)
- Google Play (1)
- Mobile Banking (1)
- SDK (1)
- Smartphone Act (1)
- WAAP (1)
- WAF (1)
- over-the-air updates (1)