Cybersecurity Insights

Stay updated on the latest cybersecurity issues including emerging threats and vulnerabilities.

1 week ago
5 Mins
Commentary

Goldoson and the Dark Side of Third-Party Mobile App Libraries

The recent Goldoson malware is a software supply chain attack that has affected more than 100 million downloads associated with 60 mobile apps."

May 16, 2023
Threat Roundup

Cybersecurity Threat Roundup #1: Chameleon, Hiddad, DAAM Android Botnet and more

In our inaugural issue, we list down the most pressing cybersecurity threats and vulnerabilities facing businesses across the globe. Stay updated with our quick snippets, intelligence reports, and direct links to more in-depth resources.

May 14, 2023
Threat Advisory

Hackers Use GoatRAT Variant to Exploit Android Accessibility Services to Attack Mobile Apps

The recent GoatRAT variant targeting Brazilian banks shows that app developers need to implement greater protections that can sniff out this abuse on a mobile device. Where we see smoke today, there is likely to be a fire tomorrow.

May 5, 2023

All threat advisories and articles.

Threat Advisory

By HOOK Or By Crook: The Insidious Launch Overlay Attack Targeting Financial Institutions

HOOK a relatively new mobile app malware largely targeting financial institutions in Poland that has now spread worldwide.

1 week ago
5 Mins
Commentary

Goldoson and the Dark Side of Third-Party Mobile App Libraries

The recent Goldoson malware is a software supply chain attack that has affected more than 100 million downloads associated with 60 mobile apps."

3 weeks ago
5 Mins
Threat Roundup

Cybersecurity Threat Roundup #1: Chameleon, Hiddad, DAAM Android Botnet and more

In our inaugural issue, we list down the most pressing cybersecurity threats and vulnerabilities facing businesses across the globe. Stay updated with our quick snippets, intelligence reports, and direct links to more in-depth resources.

3 weeks ago
4 Mins
Threat Advisory

Hackers Use GoatRAT Variant to Exploit Android Accessibility Services to Attack Mobile Apps

The recent GoatRAT variant targeting Brazilian banks shows that app developers need to implement greater protections that can sniff out this abuse on a mobile device. Where we see smoke today, there is likely to be a fire tomorrow.

1 month ago
5 Mins
Threat Advisory

Screen Spoofing: Dangerous Mobile App Overlay Attacks On the Rise

Overlay attacks are a long-known major threat to mobile apps that have made their presence known in a big way in the last few months, becoming more dangerous with new logistics of attack.

2 months ago
8 Mins
A person's face that is wearing sunglasses.
Commentary

Enhancing Application Security Protections: A Look at the Zero-Code Injection Approach to Prevent Reverse-Engineering

Zero-code injection technology serves as a high-value yet low-effort security measure that significantly enhances an application’s protection against reverse-engineering.

2 months ago
3 Mins
A person using an unprotected smartphone that is vulnerable to hackers.
Commentary

Is Mobile App Security Your Organization’s Weakest Link?

Mobile applications are the main way organizations communicate with their customers. It is also the newest pathway for hackers to gain access to sensitive data.

2 months ago
4 Mins
A visual representation of code obfuscation and polymorphism for application security.
Commentary

The Importance of Code Obfuscation and Polymorphism to Application Security

By making source, byte, or machine code significantly more difficult to understand by humans, code obfuscation stands as an essential aspect of application security.

2 months ago
5 Mins
A neon sunrise.
Commentary

A Look Beyond Traditional RASP, MTD and WAF Technologies

The need for proven measures to protect them against malicious attacks remains more important than ever for any organization dependent on the success of critical applications.

2 months ago
5 Mins

You might be interested in:

White Papers

Securing Financial Services with XTD

June 1, 2023
A financial services app that is protected by robust mobile security.

App Armor: Safeguarding Financial Service Providers’ Mobile Security

April 1, 2023
The EU propagating cyber resilience across its member states through the Cyber Resilience Act.

Security First: The European Union’s Cyber Resilience Act and Its Pending Impact on the Mobile App Development Ecosystem

April 1, 2023

Zero Trust, Zero Compromise

Our approach to cybersecurity is based on the Zero Trust model, which assumes that no user or device can be trusted by default. We will take a Zero Compromise stance on security, ensuring that every aspect of our clients’ systems and data is protected with the highest levels of encryption, access control, and authentication.