Trending

#RASP

Latest posts tagged with #RASP on Bluesky

Latest Top
Trending

Posts tagged #RASP

They call me non-select. #RASP #WarMachine

0 0 0 0
Post image

Device is Blacklisted at runtime, now what? Have you ever wondered how the Runtime Application self/security Protection isolates the device once it identifies the Root traces? During an Android ap...

#pentesting #android #rasp #bypass #runtime-security

Origin | Interest | Match

0 0 0 0
Awakari App

Device is Blacklisted at runtime, now what? Have you ever wondered how the Runtime Application self/security Protection isolates the device once it identifies the Root traces? During an Android ap...

#pentesting #android #rasp #bypass #runtime-security

Origin | Interest | Match

0 0 0 0
Preview
The Edge Advantage: Why Cloudflare and Approov Outpace Zscaler in API Security? Remote Attestation vs. RASP: Securing Mobile APIs at the Edge (Zscaler vs. Approov/Cloudflare) On this episode of Upwardly Mobile, we dive deep into the most critical architectural debate in mobile API security today: Does security enforcement belong on the client device (RASP) or off-device at the network edge (Remote Attestation)? We break down the philosophical and technical differences between the integrated Zscaler ZSDK approach, which bundles Runtime Application Self-Protection (RASP), and the specialized, edge-native partnership between Approov and Cloudflare. Discover why security experts argue that because the attacker ultimately controls the client environment, remote attestation is superior for defense against sophisticated, targeted attacks. Episode Highlights & Key Concepts The Philosophical Divide: RASP vs. Remote Attestation The core of the debate centers on where security decision logic is insulated. - RASP (Runtime Application Self-Protection): This approach implements security logic within the application code to detect threats locally during runtime, often used for real-time overlay fraud, app tampering, and emulator abuse detection. - The Risk: Any locally enforced logic provides a target for advanced adversaries. Attackers can potentially reverse-engineer RASP checks and bypass local controls to execute API requests from a tampered application instance. - Remote Attestation (Approov/Cloudflare): This specialized approach verifies that only a genuine, untampered app can access APIs, protecting backend systems from unauthorized or rogue applications. - Superior Resilience: Approov’s architecture minimizes local enforcement, ensuring attestation decisions are made entirely in the cloud service. This insulates the enforcement logic on the backend, offering superior resilience against sophisticated, targeted attacks. - Zero Feedback Loop: A key security advantage is that the attacker receives no feedback from the client on why the token validation failed at the edge, significantly raising the cost and complexity of a successful attack bypass. Architectural and Operational Advantages The comparison between the integrated Zscaler Zero Trust Exchange (ZTNA/SSE) model and the Approov/Cloudflare Edge-First (WAAP) model highlights major differences in deployment, performance, and operational cost. - Enforcement Location and TCO: The Approov/Cloudflare model focuses enforcement entirely at the Cloudflare edge using serverless functions (Workers or API Shield). This is described as a zero-operations deployment model that removes the need for customer-managed infrastructure components like Zscaler’s required App Connectors. The serverless model accelerates time-to-value and minimizes maintenance overhead. - API Key Protection: Approov provides a critical security layer by leveraging attestation guarantees to securely deliver secrets, such as API keys, just-in-time to the application only when the environment is verified as genuine and unmodified. This capability directly mitigates the risks associated with reverse engineering hard-coded keys. - Performance and Scale: The Cloudflare/Approov integration leverages Cloudflare’s global, high-performance network. Comparative tests show Cloudflare is significantly faster than Zscaler in various Zero Trust scenarios, a crucial factor for a smooth user experience and ensuring users don't bypass security controls. Furthermore, Approov offers a commercial attestation fabric built for scale, guaranteeing no quotas or throttling on attestation traffic for high-volume apps. - API Governance: Cloudflare API Shield enhances protection with rigorous positive security via OpenAPI schema validation at the edge. This preemptively guards against modern API security risks like Broken Object Level Authorization (BOLA) by ensuring that only traffic conforming to the documented API structure is accepted. Secure Your Mobile APIs with the Industry's Leading Attestation Solution This episode is proudly brought to you by Approov, the definitive solution for continuous and deterministic mobile app attestation. Approov ensures that only genuine, untampered instances of your mobile application can access your backend APIs, protecting against bot attacks, API abuse, and sophisticated tampering. Learn how to deploy mobile API security today: 🔗 https://approov.io/  Keywords: Mobile API Security, Remote Attestation, RASP, Approov, Cloudflare, Zscaler, API Integrity, Mobile App Protection, Zero Trust Architecture, Edge Security, API Abuse Prevention, Serverless Security, JWT Attestation, Mobile Bot Mitigation, Cloudflare Workers, App Attestation. 

📣 New Podcast! "The Edge Advantage: Why Cloudflare and Approov Outpace Zscaler in API Security?" on @Spreaker #apiprotection #appintegrity #approov #cloudflare #cybersecurity #edgesecurity #mobileappdev #mobilesecurity #rasp #remoteattestation #zerotrust #zscaler #zsdk

0 0 0 0

#Frog #Wooden #Detail #CloseUp #FrogRasp #Percussion #Music #Carved #Artwork #Rasp #WoodCarving #Texture #RenFest #RenaissanceFaire #Explore #BristolRenaissanceFaire #FilmPhotography #35mmFilmPhotography #35mm #HarmanPhoenix200ii

1 0 0 0
Preview
A wireless heart rate monitor powered by Raspberry Pi and Wi-Fi - how it works Discover how a Raspberry Pi and Wi-Fi can transform heart rate monitoring—delivering touchless, clinically accurate results without expensive wearables. Learn how Pulse-Fi leverages CSI data and AI for real-time wireless heart health insights.

A wireless heart rate monitor powered by Raspberry Pi and Wi-Fi – how it works A wireless heart rate monitor powered by Raspberry Pi and Wi-Fi signals is no longer.... @cosmicmeta.ai #Rasp

https://u2m.io/zsWN2N6r

0 0 0 0
A blue haired human, mayoka, and a kudagitsune, huro, stare at a glowing basement room underneath a sliding floor panel.

A blue haired human, mayoka, and a kudagitsune, huro, stare at a glowing basement room underneath a sliding floor panel.

[Art Fight 2025]
A regular day for May and Huro would've suffice. However, May and Huro noticed a secret door beneath the floor.

Where did it lead to?

Characters by @raspien.bsky.social
#Art #ArtFight #AF2025 #TeamFossils #PanchamBroDraws #rasp

6 2 0 0
Według Mozilli blokery reklam „mogą stać się nielegalne w Niemczech” » Kontrabanda Niemiecki Sąd Najwyższy uznał, że kod źródłowy, jak i wynikowy stron internetowych może podlegać ochronie prawnoautorskiej, co rodzi obawy o przyszłość wtyczek blokujących reklamy w Niemczech. Ringier Axel Springer, który pozwał twórców Adblock Plus, twierdzi, że takie oprogramowanie narusza ich prawa i zagraża ich modelowi biznesowemu.

Według Mozilli blokery reklam „mogą stać się nielegalne w Niemczech”

kontrabanda.net/r/wedlug-mozilli-blokery...

#kontrabanda #informacje #adblock_plus #eyeo #mozilla #niemcy #rasp

0 0 0 0
Preview
Apple's iOS Obfuscation Dilemma: App Store Rejection & Developer Security Challenges Apple's iOS Obfuscation Dilemma: App Store Rejection & Developer Security Challenges In this vital episode of "Upwardly Mobile," we dive deep into the complexities of mobile app security within the healthcare sector, particularly concerning the HIPAA Security Rule and the challenges of iOS code obfuscation and App Store review. As telemedicine and mobile access to ePHI (Electronic Protected Health Information) become ubiquitous, understanding and implementing robust security measures is no longer optional—it's imperative. What You'll Learn in This Episode: - The Evolving Threat Landscape for Healthcare Apps: Discover how the rapid adoption of mobile healthcare apps by both patients and practitioners has created new, data-rich attack surfaces for hackers. This includes apps used for consultations, prescription refills, appointment scheduling, accessing test results, and even those associated with medical devices. - Limitations of Traditional Security: We explore why traditional security approaches and even robust TLS (Transport Layer Security) are often insufficient for protecting mobile healthcare apps and their APIs, particularly due to the unique exposure of mobile app code and device environments. Xcode's native build settings like symbol stripping and dead code stripping are primarily for optimization and offer no meaningful protection against determined reverse-engineering efforts. - Proposed Improvements to the HIPAA Security Rule: Learn about Approov's specific recommendations to strengthen the updated HIPAA Security Rule (initially proposed in June 2024), focusing on mobile apps accessing ePHI. Key proposed changes include mandating: - App Attestation: A proven technique to ensure only genuine, unmodified apps can access APIs. - Runtime Device Attestation: Continuous scanning and real-time reporting of device environments to block requests from compromised devices. - Dynamic Certificate Pinning: Essential for protecting communication channels from Man-in-the-Middle (MitM) attacks, even when traffic is encrypted. - API Secret Protection: Explicit guidelines to ensure API keys are never stored in mobile app code and are delivered only as needed to verified apps. - Runtime Zero Trust Protection of Identity Exploits: Additional controls like app and device attestation to provide an extra layer of zero-trust security against credential stuffing and identity abuse. - Breach Readiness and Service Continuity: Extending incident response plans to cover third-party breaches and explicitly managing API keys and certificates during a breach. - The Role of https://mas.owasp.org/MASVS/: Understand how the OWASP Mobile Application Security Verification Standard (MASVS) serves as the industry standard for mobile app security, offering guidelines for developers and testers. We specifically highlight MASVS-RESILIENCE for hardening apps against reverse engineering and tampering. - The iOS Obfuscation Dilemma: Unpack the conflict faced by developers in regulated industries like fintech and healthcare: the critical need to protect proprietary algorithms and sensitive logic through code obfuscation versus the risk of rejection by Apple's App Store. Apple's guidelines are ambiguously enforced, often flagging aggressive obfuscation as an attempt to "trick the review process". - Third-Party Obfuscation Solutions: Since Xcode provides no built-in true obfuscation features, we discuss the imperative for advanced third-party solutions. Learn about techniques like symbol renaming, string encryption, control flow obfuscation, and dummy code insertion. We also touch upon leading commercial tools like Guardsquare's iXGuard, Zimperium's Mobile Application Protection Suite (MAPS), and Appdome, as well as LLVM-based obfuscators. - Obfuscation as a Compliance Control: Discover why code obfuscation and Runtime Application Self-Protection (RASP) are fundamental technical safeguards for HIPAA compliance and meeting the requirements of PCI DSS, even if not explicitly named in the regulations. - Strategic Recommendations for Implementation: Get insights on implementing a risk-based tiered approach to app protection, integrating obfuscation into your CI/CD pipeline, and transparently communicating your security posture to the App Store review team to mitigate rejection risks. Tune in to gain a comprehensive understanding of securing your mobile health applications in today's complex digital environment! Relevant Links & Resources: - Sponsor: Learn more about app and API security solutions from Approov: https://approov.io/ - Approov Blog: Injecting Mobile App Security into The HIPAA Healthcare Security Rule: https://approov.io/blog/injecting-mobile-app-security-into-the-hipaa-healthcare-security-rule - OWASP Mobile Application Security (MAS) Project: https://owasp.org/www-project-mobile-app-security/ - OWASP Mobile Application Security Verification Standard (MASVS): https://mas.owasp.org/MASVS/03-Using_the_MASVS/ Keywords: Mobile App Security, Healthcare, HIPAA, ePHI, API Security, Code Obfuscation, iOS Security, App Store Review, App Attestation, Runtime Application Self-Protection (RASP), PCI DSS, OWASP MASVS, Man-in-the-Middle (MitM) Attacks, API Keys, Zero Trust, Telemedicine, Virtual Healthcare, Mobile Health, Cybersecurity, Enterprise Security, Data Protection, Compliance, InfoSec, Privacy, Digital Health. 

📣 New Podcast! "Apple's iOS Obfuscation Dilemma: App Store Rejection & Developer Security Challenges" on @Spreaker #appdome #approov #appsecurity #codeobfuscation #dataprotection #guardsquare #healthcareit #iosdevelopment #mobilesecurity #owaspmasvs #rasp #securesoftware #zerotrust #zimperium

0 0 0 0
Preview
Tea App Breach Exposed 72,000 Selfies & IDs: Urgent Lessons for Mobile API Security Mobile-First Security: The Urgent Lessons from the Tea App Breach In this focused segment of Upwardly Mobile, we unpack the recent Tea app breach, a sobering case study that highlights the critical need for a robust mobile-first cybersecurity strategy and proper API security. The Tea app, a women's dating safety application that rapidly climbed to the top of the free iOS App Store listings and reached the No. 1 spot on Apple's US App Store, claiming over 1.6 million users, was designed to allow women to exchange information about men to enhance safety. A key feature involved new users verifying their identity by uploading a selfie. The company confirmed a major security breach, stating they had "identified authorized access to one of our systems". Preliminary findings revealed access to approximately 72,000 user images. This alarming exposure included: - 13,000 images of selfies and photo identification documents, such as driver's licenses, which users had submitted during the account verification process. - 59,000 publicly viewable images from posts, comments, and direct messages within the app. The exposed images reportedly originated from a "legacy data system" that held information from more than two years prior. Posts on Reddit and 404 Media indicated that these sensitive user images, including faces and IDs, were posted on the anonymous online messageboard 4chan, with one post explicitly stating, "DRIVERS LICENSES AND FACE PICS! GET THE FUCK IN HERE BEFORE THEY SHUT IT DOWN!" and highlighting "No authentication, no nothing. It's a public bucket". Users from 4chan claimed to have discovered an exposed database hosted on Google’s mobile app development platform, Firebase, as the source of the vulnerability. According to Ted Miracco, Chief Executive Officer of Approov Limited, the Tea app breach is a stark example of a "systemic failure in API security". He attributes this failure to several critical oversights: - Broken access controls. (https://approov.io/blog/what-you-need-to-know-about-broken-object-level-authorization-bola) - Weak authentication. - Missing transport protections. - Absent runtime safeguards. Miracco emphasizes that such failures are "not inevitable" but are "preventable with disciplined engineering, proper API defenses, and a real commitment to protecting user trust". This incident highlights a common pitfall where companies "rush apps to market, driven by subscriber growth and churn metrics, while privacy and security are sidelined". The broader lesson from the Tea app breach underscores how mobile apps introduce significant risk to an organization's back-end services. Mobile apps serve as a "front door to the back end," and a mobile device effectively holds "the secret key to the front door" – the key to server-side APIs. The increasing reliance on numerous server-side APIs accessed via mobile devices creates growing security exposure, especially since many APIs are often not adequately protected. Shockingly, up to half of APIs may lack basic usernames and passwords, and their access keys can be easily stolen from various locations, including mobile device files, server-side files, or even decompiled application source code. Hackers, by gaining control over their own devices, can easily reverse engineer apps and steal crucial API keys, which then allow them to build scripts to attack back-end corporate services undetected. Failing to protect API keys is likened to "putting all your money in a safe place in the home but not locking the front door". This breach serves as a powerful reminder that organizations must prioritize mobile security as a central component of their cybersecurity strategy, rather than an afterthought.

📣 New Podcast! "Tea App Breach Exposed 72,000 Selfies & IDs: Urgent Lessons for Mobile API Security" on @Spreaker #approov #certificatepinning #databreach #datingapps #deviceintegrity #digitalsecurity #miracco #mobilesecurity #rasp #teaapp

0 0 0 0
Preview
Securing the Cloud | Unlocking True Mobile & API Security Unlocking True Mobile & API Security in the Cloud Age Welcome to "Upwardly Mobile", the podcast dedicated to navigating the complex world of mobile and cloud security! In this episode, we dive deep into why mobile app security and API security are not just technical concerns, but fundamental business imperatives for organisations of all types, from agricultural giants like John Deere to popular dating apps such as Hinge. We explore how the traditional reliance on static defences like code obfuscation is no longer sufficient against today's sophisticated, AI-powered threats, and what a truly resilient, Zero Trust-based security strategy looks like. Why Mobile & API Security Matters to Everyone in Your Organisation: The consequences of neglecting mobile app and API security are severe, ranging from massive data breaches to reputational damage and direct impacts on business operations. Here’s why key stakeholders deeply care: • Operational Leadership & Executives (e.g., C-suite): For companies like John Deere, insecure APIs and mobile apps can lead to attackers accessing, altering, or deleting "sensitive business information related to a farm's operations", resulting in "competitive disadvantage or even sabotage". For dating apps like Hinge, the core business relies on user trust, and API flaws, often exploited via the mobile app, can expose "vast amount of Personally Identifiable Information (PII) for other users", leading to "catastrophic for user acquisition, retention, and the company's survival". The ultimate "consequences of vulnerabilities—such as data breaches affecting billions and leading to hundreds of billions in losses"—fall under their purview. • Security Teams (e.g., CISO, Security Architects): Their mandate is to implement a "holistic" security approach that "protect[s] the app, its communications, and the API". They understand that "APIs are the true target" for attackers and that "a vulnerable mobile app communicating with a misconfigured cloud backend is a recipe for disaster". They are tasked with implementing "robust AppSec Strategy" and "strong Cloud Security Posture Management (CSPM)" to prevent "service disruption" and "full system compromise". • Legal & Compliance Teams: Mobile app and API vulnerabilities, as seen in e-hailing apps, can expose "vast amount of Personally Identifiable Information (PII)". This necessitates their involvement due to potential "severe privacy violations, massive user exodus, and significant legal and regulatory repercussions" associated with data breaches and non-compliance with data protection regulations. • Engineering & Development Teams: These teams are "directly responsible for 'building secure code for both the mobile app and the backend'". They must implement "secure development practices" and are critically concerned with "improper handling of secrets" like API keys, which are often hardcoded and easily extracted. • Marketing & Brand Management Teams: A breach of sensitive user data dueating to API or mobile app vulnerabilities would "severely damage the brand's reputation and trust", directly impacting efforts to attract and retain users. The Flaws in Traditional Mobile Security: • Obfuscation is Not Enough: While code obfuscation aims to deter reverse engineering and IP theft, it is a "thin veil, not an impenetrable shield". It offers "minimal protection against threats that manifest during runtime" and is "ineffective secret protection" as secrets must eventually be in cleartext memory. It can also create a "false sense of security" and is increasingly vulnerable to "modern tools and AI" which can automate deobfuscation. • APIs are the True Target: Attackers are increasingly bypassing the mobile app itself and "targeting the backend APIs directly". APIs provide a "direct pathway to backend application logic and sensitive data stores", making them prime targets for "credential stuffing, account takeover (ATO), scraping, and business logic abuse". Recent incidents involving e-hailing and delivery apps, Experian, and John Deere highlight common flaws like https://approov.io/blog/what-you-need-to-know-about-broken-object-level-authorization-bola and insecure access controls that exposed vast amounts of PII and operational data.The Solution: Embracing Dynamic, Zero Trust Runtime Protection:To address modern threats, a decisive shift from static, pre-deployment security to a "dynamic, runtime-centric model rooted in Zero Trust principles" is essential. This approach entails:• Zero Trust Architecture: This model mandates "never trust, always verify", requiring continuous, runtime verification of devices, users, and networks for access to critical resources. It emphasizes that "trust is never implicit" and acknowledges that traditional static checks and one-time authentication are insufficient. Zero Trust requires "external, cryptographically verifiable measurements that originate outside the app and cannot be forged or intercepted" to avoid a "circular trust problem". • Key Dynamic Defenses:     ◦ https://approov.io/mobile-app-security/rasp/: Acts as the app's "internal bodyguard", detecting and preventing real-time attacks from within the application. It identifies threats like reverse engineering attempts, code tampering, execution on compromised environments (root/jailbreak), and the presence of hooking frameworks. RASP provides "real-time protection" and "zero-day potential" by detecting anomalous behaviour.     ◦ https://approov.io/mobile-app-security/rasp/app-attestation/: This crucial process verifies the "authenticity and integrity of the mobile application instance and its runtime environment" before granting API access. It ensures that only "genuine, untampered app instances" running in a safe environment can interact with APIs, effectively solving the "‘What’ vs. ‘Who’ Problem" (validating the client app in addition to the user). This blocks automated bots, scripts, and tampered apps.     ◦ https://approov.io/mobile-app-security/rasp/runtime-secrets/: This robust solution eliminates the need to hardcode sensitive credentials like API keys directly into the app. Instead, secrets are stored securely in a backend service and delivered "just-in-time" to the validated app instance only after passing rigorous app attestation checks. This protects against both static and dynamic extraction of secrets.    ◦ Dynamic Channel Protection (Dynamic Pinning): Overcomes the brittleness of traditional static certificate pinning. This approach securely retrieves the current, valid set of pins dynamically over the air from a trusted management service (after attestation). This ensures "robust MitM Protection" against Man-in-the-Middle attacks while offering "flexibility and maintainability" for certificate rotations without requiring app updates.• Defense in Depth: An "optimal mobile security strategy employs a defense-in-depth approach, leveraging both static and dynamic techniques". While static analysis and obfuscation can still identify coding errors early, they must be "complemented by robust dynamic and runtime defenses". For applications handling sensitive data or critical functions, dynamic security measures are "fundamental requirements for achieving adequate resilience against modern threats". Empowering Your Mobile-to-Cloud Connection with Approov: Solutions like Approov Mobile Security play a vital role in securing the communication channel between your genuine mobile app and the cloud backend. Approov provides a "unique, patented runtime shielding solution" that focuses on:• Mobile App Attestation: Verifying the integrity of the running mobile app to ensure it's genuine and untampered, preventing bots and modified apps from accessing APIs. • API Request Verification: Cryptographically binding API requests to an attested app instance, ensuring only legitimate requests are processed.• Runtime Secrets Protection: Eliminating hardcoded API keys by securely delivering short-lived tokens to attested apps on demand.• Dynamic Pinning: Providing secure, over-the-air updates for certificate pins, ensuring tamper-proof communication between the app and API. Approov enables "https://approov.io/knowledge/ota-updates-are-essential-for-securing-mobile-apps" for security policies, pin configurations, and attestation logic, allowing instant responses to new threats without requiring app releases. It offers analytics and reporting for monitoring, auditing, and compliance.By adopting a comprehensive AppSec strategy that includes strong cloud security practices and innovative solutions, organisations can significantly reduce their attack surface and protect their users and valuable data.Don't leave your back door open – and ensure only trusted visitors can reach your front door! -------------------------------------------------------------------------------- Sponsored by: Approov Visithttps://approov.io to learn how Approov can safeguard your mobile apps and APIs with advanced runtime protection, app attestation, and secure secrets management. -------------------------------------------------------------------------------- Keywords: Mobile App Security, API Security, Cloud Security, AppSec, Zero Trust, RASP, App Attestation, Runtime Secrets Protection, Dynamic Pinning, Code Obfuscation, Data Breach, PII, Cyber Security, Digital Transformation, Enter

📣 New Podcast! "Securing the Cloud | Unlocking True Mobile & API Security" on @Spreaker #apisecurity #appattestation #approov #cloudsecurity #hinge #johndeere #mobilesecurity #rasp #zerotrust

0 0 0 0