The last year has not been great for crypto. Most crypto currencies, including Bitcoin, experienced...
Approov Blogs on MitM Attack (2)
23 June, 2023
How to Use a MitM Attack to Bypass Code Obfuscation to Extract Secrets From the ChatGPT Mobile App
In a previous article, we saw how to use code obfuscation to make it more difficult for an attacker...
"Bank-grade security" is a term often used to describe a high level of security measures...
Runtime Application Self-Protection (RASP) is a security technology that is designed to protect...
This is our second blog highlighting the results of the Approov Threat Lab Report. In our previous...
Financial apps have access to valuable and sensitive personal data, so you would think mobile app...
Posts on
- API Security (156)
- Mobile App Authentication (93)
- Mobile App Development (82)
- Mobile Security (75)
- Threats (67)
- Mobile App Security (63)
- API Abuse (62)
- Integration (54)
- API Keys (52)
- API (48)
- MitM Attack (46)
- Bots (39)
- Business (38)
- Certificate Pinning (32)
- Reverse Engineering (31)
- Quickstart (23)
- Healthcare (21)
- TLS (21)
- Android (20)
- Backend (20)
- Repackaged Apps (20)
- App Attestation (19)
- Fintech (18)
- iOS (17)
- Mobile API Security (16)
- Scrapers (14)
- Mobility (13)
- RASP (13)
- News (9)
- Zero Trust (9)
- Android Security (8)
- Fake Accounts (8)
- Run-time Secrets Protection (8)
- Third Party APIs (8)
- Gaming and Gambling (7)
- Man-in-the-Middle attack (7)
- API Gateway (6)
- Account Hijacking (6)
- ReactNative (6)
- Automotive (5)
- HarmonyOS (5)
- Mobile Health (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Apple (4)
- Code Obfuscation (4)
- Google (4)
- OWASP (4)
- Retail (4)
- Aggregators (3)
- CheatingAsAService (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Token-Based API Access (3)
- Web Security (3)
- gRPC (3)
- App Store (2)
- Cloud (2)
- Cordova (2)
- Cross-Platform (2)
- Data Security (2)
- Huawei (2)
- Mobile Banking (2)
- Mobile Finance (2)
- Mobile Payment Security (2)
- Pentesting (2)
- Runtime Application Self-Protection (2)
- SDLC (2)
- AWS (1)
- Account Takeover (1)
- App Shielding (1)
- Aviation (1)
- BOLA (1)
- CNIL (1)
- Connected Cars (1)
- Credential Stuffing (1)
- DMCC (1)
- DeviceCheck (1)
- E-Commerce (1)
- Frida (1)
- Frontend (1)
- Google Play (1)
- SDK (1)
- Smartphone Act (1)
- WAAP (1)
- WAF (1)
- over-the-air updates (1)
Popular Posts
- How to Bypass Certificate Pinning with Frida on an Android App
- Revealing the Limitations of Apple DeviceCheck and Apple App Attest
- How to Extract an API Key from a Mobile App by Static Binary Analysis
- How to MitM Attack the API of an Android App
- Why Does Your Mobile App Need an API Key?
- The Limitations of Google Play Integrity API (ex SafetyNet)
- Securing HTTPS with Certificate Pinning on Android
- How Poor API Security Led to Major Breaches in 2024
- 5 Threats to Mobile Games and 5 Essential Security Measures
- Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
- How to Protect Against Certificate Pinning Bypassing
- Epic Games Won Against Google but Lost to Apple - What are the Implications?
- Bypassing Certificate Pinning
- How to Ride the Bus for Free (Hackers Need Not Apply)
- Three Actions You Should Take Right Now to Stop Mobile MitM Attacks