Dev sec blog

Dev Sec Blog

Build Better Mobile Malware Prevention

In this Build Better Mobile Malware Prevention blog series, we’ll share our mobile security research and cover the top attacks, threats, methods and tools used against Android & iOS apps. This includes malware bridges like Magisk, hooking and instrumentation frameworks like Frida, Root Hiding and Jailbreak detection bypass tools as well as other advanced malware methods against iOS and Android apps at runtime. Understanding and defending against the growing diversity of mobile exploits and attacks is critical to ensuring mobile business integrity and an amazing mobile experience for all mobile users.

We’ll also share DevOps CI/CD and Data-Driven DevSecOps™ best practices, and highlight key operational and industry insights, to help you achieve mobile DevSecOps agility and follow mobile app protection best practices in CI/CD.

Subscribe today. We’d love to have you join our community!

Header-BadBotSad

Making Bad Bots Sad at F5 Agility

According to the Q1 2018 State of Mobile Fraud analysis from AppsFlyer, bots are now the most dangerous threat to mobile apps, responsible for over 30% of fraudulent installs.

Web…

Read More »

The Need for Fusion: XcodeGhost Busters

Last week’s discovery of the XcodeGhost is the first known example of compiler level malware on OS X. The malicious code that underlies XcodeGhost is cleverly designed to reach consumer data…

Read More »
Header-BadBotSad

Making Bad Bots Sad at F5 Agility

According to the Q1 2018 State of Mobile Fraud analysis from AppsFlyer, bots are now the most dangerous threat to mobile apps, responsible for over 30% of fraudulent installs.

Web…

Read More »

The Need for Fusion: XcodeGhost Busters

Last week’s discovery of the XcodeGhost is the first known example of compiler level malware on OS X. The malicious code that underlies XcodeGhost is cleverly designed to reach consumer data…

Read More »

Have a Security Project?

We Can Help!

PaulMaking your security project a success!
By filling out this form, you opt-in to recieve emails from us.

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs