Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27,...
Blogs on Healthcare
A recent vulnerability discovered in an UK National Health Service HS API has once again...
Data breaches involving the healthcare industry can have serious consequences, as they can...
Introduction and Context
This blog provides a snapshot of mobile app security in Healthcare based...
Considering the recent “Playing with FHIR” research report together with the earlier “All that We...
Alissa Knight released her report “Playing with FHIR” a couple of weeks ago (download it here)...
In this article, we’ll be looking at the role that mobile health or mHealth apps and Application...
We are delighted to be hosting some unique content from our friend and recovering hacker Alissa...
We are delighted to be hosting some unique content from our friend and recovering hacker Alissa...
Posts on
- API Security (153)
- Mobile App Authentication (92)
- Mobile App Development (82)
- Mobile Security (76)
- Threats (67)
- API Abuse (62)
- Mobile App Security (58)
- Integration (54)
- API Keys (50)
- API (49)
- MitM Attack (45)
- Bots (39)
- Business (39)
- Certificate Pinning (31)
- Reverse Engineering (31)
- Quickstart (23)
- TLS (21)
- Android (20)
- Backend (20)
- Healthcare (20)
- Repackaged Apps (20)
- Fintech (18)
- iOS (17)
- Mobile API Security (14)
- Scrapers (14)
- App Attestation (13)
- Mobility (13)
- RASP (11)
- News (9)
- Android Security (8)
- Fake Accounts (8)
- Third Party APIs (8)
- Gaming and Gambling (7)
- Zero Trust (7)
- API Gateway (6)
- Account Hijacking (6)
- Man-in-the-Middle attack (6)
- ReactNative (6)
- HarmonyOS (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Apple (4)
- Automotive (4)
- Google (4)
- Mobile Health (4)
- OWASP (4)
- Retail (4)
- Run-time Secrets Protection (4)
- Aggregators (3)
- CheatingAsAService (3)
- Code Obfuscation (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Web Security (3)
- gRPC (3)
- App Store (2)
- Cloud (2)
- Cordova (2)
- Cross-Platform (2)
- Huawei (2)
- Mobile Payment Security (2)
- Pentesting (2)
- SDLC (2)
- Token-Based API Access (2)
- AWS (1)
- Account Takeover (1)
- App Shielding (1)
- BOLA (1)
- Connected Cars (1)
- Credential Stuffing (1)
- DMCC (1)
- Data Security (1)
- DeviceCheck (1)
- E-Commerce (1)
- Frida (1)
- Frontend (1)
- Google Play (1)
- Mobile Banking (1)
- Mobile Finance (1)
- SDK (1)
- Smartphone Act (1)
- WAAP (1)
- WAF (1)
- over-the-air updates (1)