Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

iOS app pen testing : Harnessing the power of r2frida for runtime manipulation

You might already know a fair bit about r2frida by now - its definition, usage, features, installation, and examples - something we discussed in the previous blog of this series. In case you missed out on it, you can find it here. In this blog, we will explore how r2frida can be instrumental in manipulating an iOS app's runtime.

The Rising Threat of Mobile Phishing and How to Avoid It

Remote work and bring-your-own-device (BYOD) culture have made mobile devices a permanent part of our work lives. In today’s professional world, mobile devices can do basically everything a laptop or desktop can do — including get phished. Mobile devices are increasingly the starting point of the modern kill chain, and mobile phishing plays an important role in the process. Understanding how threat actors attack mobile devices is the first step to keeping data and devices secure. ‍

CrowdStrike Falcon for Mobile Unlocks New Mobile Security Options for SMBs

Small and medium-sized businesses (SMBs) increasingly rely on mobile technology to drive efficiency and stay competitive. However, the use of mobile devices introduces security risks that SMBs must address. Recognizing this, CrowdStrike Falcon for Mobile now offers iOS unmanaged support, extending robust security to devices without the cost and complexities of traditional mobile device management (MDM). Let’s take a closer look.

Don't Let Your Old iPhone Gather Dust: Sell it for Cash Now

In today's fast-paced tech world, new smartphone models are constantly being released, leaving many of us with old devices collecting dust in a drawer. If you have an old iPhone lying around, don't let it go to waste. Instead, consider selling it for cash. Not only can this provide a financial boost, but it's also an environmentally friendly choice. Here's a simple guide on why and how you should sell your old iPhone.

Embracing BYOD Security with Managed AppleIDs

I am excited to see Apple’s recent expansion of identity support in Apple Business Manager, their device and app lifecycle management tool for the enterprise. Simply put, it enables wider adoption of Managed Apple IDs by allowing organizations to use corporate email addresses as corporate Apple IDs, and integrate with a broader range of identity providers (IdPs) beyond Google Workspace and Microsoft Entra ID.

A Comprehensive Guide to r2Frida

In iOS app security, the ability to seamlessly blend static and dynamic analysis capabilities is paramount. One tool that stands out in this domain is r2frida. This unique tool combines the robust binary analysis functionalities of Radare2 with the dynamic instrumentation features of Frida, creating a potent toolkit for dissecting iOS applications and fortifying their security posture.

Mastering UI Design with Flutter: Tips, Tricks, and Tools

You have probably heard about Flutter apps, high-performance cross-platform applications with a single code base. They are built on Flutter, an open-source UI SDK created by Google on Dart. Flutter UI is gaining popularity because it combines visual elements that users can see and engage with, like buttons, images, lists, navigation patterns, text fields, animations, and more. The ease of work, touch of creativity, simplicity of coding, and its numerous awesome tools make Flutter a popular choice in the development world. But how do you master UI design with Flutter?

What is Mobile Application Penetration Testing: Benefits & Tools

Mobile applications are ubiquitous, but their security can be a concern. Unlike web applications, in a mobile landscape, both the device and the mobile application have a crucial role in security due to increasing cyber threats. Mobile application penetration testing (mobile app pen testing) is a proactive security measure to identify and address vulnerabilities before malicious actors exploit them.

Simplify SOC analyst experience with the enhanced Corelight Splunk App

Security operations centers (SOCs) play a vital role in detection, containment and mitigation of today’s advanced cyber attacks. SoC teams are also responsible for proactively hunting for threats, and improving the organization’s overall security posture. Modern SOC analysts struggle with alert fatigue.