Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Post iOS Jailbreak Customization: Exploring iOS Tweaks & Private APIs

If you have ever jailbroken an iOS device, you have likely encountered many things that we will discuss today. Let's start with one of the most commonly used terms that gets thrown around: iOS tweaks. There are plenty of them out there, depending on the needs - whether for fun or profit, simple or complex - ranging from making your lock screen look fancy to running your banking app on a jailbroken device.

Why Is Manual Testing a Thing of the Past?

Before end-to-end (E2E) testing frameworks, the software development industry struggled with fragmented and inefficient testing methods. Testing was manual, labor-intensive, and prone to human error, which limited testing coverage and left many critical issues undetected until later stages of development. This manual approach relied heavily on developers and testers executing test cases by hand, leading to substantial inefficiencies and incomplete test coverage.

A Complete Overview of Binary-Based SAST

Zimperium's Global Mobile Threat Report found that unique mobile malware samples grew by 51% in 2022. According to Anne Neuberger, the US Deputy National Security Advisor for Cyber and Emerging Technologies, the annual average cost of cybercrime will reach over $23 trillion in 2027. The threat landscape and the cost of ignoring security are increasing. It is no longer advisable to just be reactive but proactive in maintaining the security of mobile devices.

A Detailed Overview of SQL Injections (+ Free cheatsheet)

SQL injection vulnerabilities may affect any website or application that employs an SQL database, such as MySQL, Oracle, SQL Server, or others. Malicious actors may use them to gain unauthorized access to sensitive information, such as customer information, personal data, trade secrets, and more. For example, SQL injections were responsible for 23% of global vulnerabilities in 2023, Moreover, 19% of the internet faces cross-site scripting (stored) attacks.

iOS app pen testing : Harnessing the power of r2frida for runtime manipulation

You might already know a fair bit about r2frida by now - its definition, usage, features, installation, and examples - something we discussed in the previous blog of this series. In case you missed out on it, you can find it here. In this blog, we will explore how r2frida can be instrumental in manipulating an iOS app's runtime.

A Comprehensive Guide to r2Frida

In iOS app security, the ability to seamlessly blend static and dynamic analysis capabilities is paramount. One tool that stands out in this domain is r2frida. This unique tool combines the robust binary analysis functionalities of Radare2 with the dynamic instrumentation features of Frida, creating a potent toolkit for dissecting iOS applications and fortifying their security posture.

An Actionable Guide to OWASP MASVS V2 (+ Practical Examples)

In an era of digital innovation and technological advancements, robust application security has never been more crucial. As cyber threats continue to evolve, organizations must stay ahead of the curve to protect their sensitive data and maintain the security of their users. One project that can help in this process is OWASP (Open Web Application Security Project), a globally recognized non-profit organization dedicated to improving application security.

A Complete Overview of OWASP Mobile Top 10 2024 (+ A Free Checklist)

31% of executives cite improper risk identification as their organizations’ top cybersecurity challenge. Reacting only to attacks leads to an average 118-day breach detection time, which can significantly impact business. Staying informed about cybersecurity risks is crucial. OWASP offers a list of common threats for testers, but some find them insufficient due to its crowdsourced nature.

Built for Mobiles: Why Choose a Mobile-First Vulnerability Assessment Tool?

Security teams spend an average of 130 hours per week monitoring and tracking threats. 43% of cyber attacks are aimed at small businesses, while only 14% are prepared to defend themselves. Companies with more than 10,000 employees have the most critical-severity vulnerabilities. A vulnerability is an exploitable gap in your application's security. As your threat landscape increases, the attack surface and the number of vulnerabilities might also increase.

Choosing the Best Mobile Application Security Testing Tool in 2024

As per Statista, mobile apps are estimated to generate over $935 billion in revenue in 2024, which includes: This means businesses must prioritize mobile app testing and security posture to safeguard users' personal and financial information from security breaches. For successful mobile app testing, your team must test the app through numerous operating system versions, network bandwidths, screen resolutions, and devices—to ensure the app performs seamlessly across devices.