Appknox

Singapore
2014
Jun 27, 2022   |  By Manmesh Malhotra
Four high-severity vulnerabilities have been exposed to the framework used by pre-installed Android system apps with millions of downloads. Fixed by Israeli developer MCE Systems, this issue could allow an attacker to launch remote and local attacks or be used as a vector to exploit extensive system privileges to obtain sensitive information. Here’s what Microsoft 365 Defender Research Team had to say about it.
Jun 23, 2022   |  By Gaurav Gupta
The Chinese government took down over 2 million applications from Chinese app stores in just two years (2018-2020)! Now, the government has revised and published stricter cybersecurity updates or provisions for mobile app development, which will go into effect from August 1st, 2022. Why is this happening, and what does the new policy say? Also, how does it affect the developers within China? If you have these questions on your mind, this blog is for you.
Jun 23, 2022   |  By Shivani Dhiman
Navigating the internet in 2022 is more dangerous than ever for Australian netizens. The risks to the privacy of Australian customers are at an all-time high, as the nation has reported the highest percentage of mobile threats globally, standing at 26.9%. The average Australian netizen uses web-based mobile apps to browse, entertain, communicate, and shop online.
Jun 22, 2022   |  By Ravina Bhayani
Are you looking about getting a penetration test done, but you're not sure what kind of test to get. If you are an IT consulting company, you must have heard about black-box, grey-box, and white-box testing. The following are some of the most common questions asked when it comes to selecting the type of testing: Consider the advantages and disadvantages of black box, grey box, and white box testing.
Jun 16, 2022   |  By Abhinav Vasisth
As a mobile app developer, you must develop and release fully functional and safe applications. While you can manage the functionality quite comfortably, making the application secure and resilient to cyber-attacks is hard. So, what should you do? Well, we got you covered. This blog discusses the top 10 security issues developers encounter during mobile app development and the solutions.
Jun 14, 2022   |  By Subho Halder
If you are not taking enterprise mobile security seriously, look at these stats: According to the State of Enterprise Mobile Security 2022 Report, 75% of the analyzed phishing sites targeted mobile devices. The same report stated that 30% of the total zero-day vulnerabilities discovered in 2021 targeted mobile devices. Security week states that mobile phishing attacks have increased at a consistent rate of 85% since 2011.
Jun 8, 2022   |  By Raghunandan J
It's been a while; there has been a debate between GDPR and POPIA. Both compliances have made quite a mark since their inception. The South African Protection of Personal Act, also known as POPIA, means to provide South African citizens control over their data. It also makes all organizations processing the personal information in South Africa legally responsible to protect the data.
Jun 7, 2022   |  By Harshit Agarwal
The pandemic has caused havoc on business and personal lives. It also highlighted the importance of personal data and its vulnerability. To combat this, governments across the globe have reviewed and modulated their privacy laws and regulations. Including the African governments and legislators. Over the recent years, Internet usage has increased significantly on the African continent. The usage was aided by continued investment in local digital infrastructure and improved user access.
May 31, 2022   |  By Harshit Agarwal
Cyberattacks on e-commerce sites are always a frequent phenomenon. Every e-commerce retailer wants to improve the consumer experience, but if they're not careful, their efforts could transform their business website into a playground for cybercriminals. Without a doubt, they are gold mines of personal and financial information for threat actors. And as a result, companies worldwide are losing billions to e-commerce fraud (more than 20$ billion in 2021).
May 26, 2022   |  By Raghunandan J
With the Internet's widespread growth, South Africa has become quite dependent on it for economic affairs. This sharing of self-generated data is a boon to all business transactions and even social interactions. The increased dependence on the digital world raises significant concerns about cyber security. Cybercrime is a global problem that has affected South Africa, both in the private sector and in government.
Dec 18, 2021   |  By Appknox
Join us in an exciting webinar by Appknox's CISO & Co-Founder, Subho Halder and Vaishali Nagori, Penetration Tester at Appknox on Payment Gateway Related Vulnerabilities. Know how Fortune 500 companies have created superior & secure payment gateways for their customers.
Aug 26, 2021   |  By Appknox
Launching a mobile enterprise application is no easy feat and one minor security breach can undo all your hard work in no time. With the right security platform, you can detect and fix security vulnerabilities without losing sleep. Say hello to Appknox, a plug-and-play security solution that secures your mobile enterprise applications in less than 60 minutes. Rated the highest in security products in Gartner and being a high performer on G2crowd for SAST, we set ourselves apart from our competition by allowing you to integrate your SDLC with all project management and CI-CD toolchain.
Aug 11, 2021   |  By Appknox
A security-first strategy is a competitive business advantage in today's world. Know how Fortune 500's have created superior and secure digital experiences for their customers.
Aug 3, 2021   |  By Appknox
Launching a mobile enterprise application is no easy feat and one minor security breach can undo all your hard work in no time. With the right security platform, you can detect and fix security vulnerabilities without losing sleep. Say hello to Appknox, a plug-and-play security solution that secures your mobile enterprise applications in less than 60 minutes. Rated the highest in security products in Gartner and being a high performer on G2crowd for SAST, we set ourselves apart from our competition by allowing you to integrate your SDLC with all project management and CI-CD toolchain.
Jun 30, 2021   |  By Appknox
Unlocking the Secrets of building a secure app Under 60 Minutes Build a culture of Secure Programming in your engineering team . With the amount of (attempted) security breaches and high paced sprint cycles, securing your mobile applications from day 1 is a driving force to ship applications at speed.
Mar 30, 2021   |  By Appknox
This week #knoxtars celebrate our seventh year in business. During this time we have continually secured businesses across multiple industries to build a safer mobile ecosystem We wish to thank every single team member past and current, clients and partners who we have worked with us over the years. We take great pride in our work and look forward to helping your business grow & add more feathers to our cap.
Jan 11, 2021   |  By Appknox
Juspay, an Indian payment service provider, which processes transactions for giants like Amazon, MakeMyTrip, Airtel, Flipkart, Uber and Swiggy suffered from a data breach resulting in 3.5 crore records of customer data being compromised. The data dump contains sensitive information including the card’s merchant brand, expiry date, the first six and last four digits, user name, email IDs and phone numbers. This data can be put together and used for phishing scams.
Dec 30, 2020   |  By Appknox
Every year has defining moments, but no one could’ve expected the world-changing and paradigm-shifting developments that have taken up over the course of this year. That Include combating COVID-19, Global Warming, WFH, waves of social unrest and many more. At Appknox we have had several defining moments. We have seen substantial growth in terms of revenue, customers, region of operations and many more.
Dec 23, 2020   |  By Appknox
Appknox is the worlds most powerful plug and play security platform which helps Developers, Security Researchers and Enterprises to build a safe and secure mobile ecosystem using a system plus human approach to outsmart smartest hackers.
Oct 5, 2020   |  By Appknox
Cyberspace is vulnerable to the expanding array of incidents, whether human-made or natural, intentional or accidental, which easily gets exploited for nefarious purposes. CERT-In prioritizes monitoring, detecting, defending, reporting, mitigating, and recovering any breach or cyberattacks.
Apr 22, 2021   |  By Appknox
When you are looking for genuine, inexpensive unbiased information to make your application secure, there is no better source to go to than OWASP. OWASP gives you guidelines to the industry's top threats and security best practices that help ensure your applications are secured. Take a look at this FREE OWASP Guide that covers vulnerabilities from both web and mobile to give you a comprehensive overview of your application's security status.
Apr 22, 2021   |  By Appknox
Apple is known to employ slightly more stringent norms as compared to its other counterparts as far as Approving apps is concerned.
Apr 1, 2021   |  By Appknox
Detect and eliminate critical threats with the lowest visibility hiding behind the thickest of code. Protect your mobile apps and it's data from malicious attacks.
Apr 1, 2021   |  By Appknox
As SaaS businesses continue to evolve in a world of cut throat competition, key decision makers must ensure full accountability of their user's security. Sensitive and personal data should be monitored and kept secure along with innovation and strategic investments. Hence security for SaaS organisations is a critical component as a strategic driver for the growth of business.
Mar 1, 2021   |  By Appknox
When we make our way into the ecosystem of security technology and infrastructure initiative, learning about application security trends becomes of utmost importance. The unpredictable COVID-19 situation has made global businesses more vulnerable than ever to cyberattacks and breaches. Be it the Zoom data breach (500k records stolen) or the Marriott (5.2 million records breached), hackers don't seem to miss opportunities to exploit vulnerabilities and gain access to business infrastructures and public records.
Mar 1, 2021   |  By Appknox
In public-facing cloud environments with faster than ever deployment and delivery speeds, we need security models that can keep up with the pace. However, security still remains one of the most downplayed affairs in many organizations. While DevOps practices have helped organizations find means to build and react to the market faster, the hurdles of relying on traditional security are still making inroads for more and more threat incidents.

Appknox is the worlds most powerful plug and play security platform which helps Developers, Security Researchers and Enterprises to build a safe and secure mobile ecosystem using a system plus human approach to outsmart smartest hackers.

Our Products:

  • Static Application Security Testing (SAST): With 36 different test cases, Appknox SAST can detect almost every vulnerability that’s lurking around by analyzing your source code. Our tests cover security compliances like OWASP Top 10, PCI-DSS, HIPAA and other commonly used security threat parameters.
  • Dynamic Application Security Testing (DAST): Detect advanced vulnerabilities while your application is running. Appknox DAST simulates actual attacks on our test environment to analyze, detect and plug those pesky vulnerabilities that can fall prey to runtime and network attacks like MITM.
  • Application Programming Interface (API) Testing: Quite different than SAST or DAST, Appknox's APIT tests the server-side of your application. Appknox API scan captures API's at requested endpoints and runs 15+ tests on each of these API's to detect vulnerabilities that may compromise the security of the app servers.
  • Manual Application Security Testing (MAST): Nevertheless, the human mind is much sharper than a machine. Hence MAST in our security testing product that utilizes experienced security researchers to test vulnerabilities in your app.
  • Remediation for Mobile Apps: Prioritize remediation with a research-driven security evaluation guided by OWASP security standards. Appknox remediation framework is designed to help development teams understand and remediate vulnerabilities without slowing down on SDLC.

Build and deploy world-class mobile apps for your organizations at scale and leave your mobile app security to us.