
Flipping the Economics of Cybersecurity with “Policy as Code”
Businesses invest capital to create valuable products and services and bring with them an expectation of a high return on that investment. Costs in a business are based on…
Our DevSec blog is dedicated to the topics, best practices and cybersecurity research needed by mobile developers (DEV) and cybersecurity (SEC) teams in the modern mobile DevOps pipeline.
In this DevSec blog we’ll share our research and best practices in securing Android & iOS apps. Our goal is to help mobile developers and cyber security teams stay ahead of mobile app hackers, attackers, pass mobile application penetration tests, and make mobile DevSecOps compliance easy.
Subscribe today. We’d love to have you join our community!
Businesses invest capital to create valuable products and services and bring with them an expectation of a high return on that investment. Costs in a business are based on…
Spear phishing attacks used to be limited to high-profile targets such as CEOs, politicians, and other influential individuals. These attacks required extensive research, preparation, and coordination, making them a…
Threat and risk data is critical to combating mobile fraud. Everyone knows that. The more important challenge has been “when,” “where” or “how” to leverage this data to defeat…
In recent years, the proliferation of streaming services has revolutionized the way we consume media. From movies and TV shows to music and podcasts, the convenience of streaming platforms…
A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button…
This post will discuss Appdome’s new social engineering prevention solution.
In an era where mobile applications have become an integral part of our lives, safeguarding user data and trust is…
In an era where secure and lawful app operations are paramount, the demand for robust geo compliance, identity verification, and anti-fraud measures has surged across various sectors. With specific…
In an era where mobile apps reign supreme, the threat landscape has shifted significantly in terms of where cyber-criminals focus their efforts using malicious bots.
The Menace of Malicious…
Traditional anti-bot solutions, like Web Application Firewalls (WAFs), struggle to protect against most mobile-based attack vectors, resulting in significant blind spots in organizations’ API defenses, highlighting the need for advanced mobile-specific bot defense solutions.
The Securities and Exchange Commission’s recent indictment of the SolarWinds CISO grabbed my attention. I had to write about it from a DevSecOps, or…
As the pandemic comes to an end, the world is ready to travel again with people using booking apps to book their travels. The online travel booking segment is…
How to Protect Against Accessibility Service Abuse in Android & iOS Apps
Mobile malware has a new best friend: Accessibility Services. Accessibility services are designed to provide features to…
Have a Security Project?
We Can Help!