Trending

#appsecurity

Latest posts tagged with #appsecurity on Bluesky

Latest Top
Trending

Posts tagged #appsecurity

πŸ”¬ In JavaScript, the instruction "Function(inputString)()" cause the content of "inputString" to be executed. "Function()" is a constructor that creates a new function from a string of code, similar to "eval()", but slightly more contained.

#appsec #appsecurity

0 0 1 0
Example of execution.

Example of execution.

πŸ§‘β€πŸŽ“ Learning of the day for me thanks to @pentesterlab.com (for the presentation of the behavior and the code review lab) and Claude (for the detailed explanation):

#appsec #appsecurity

0 0 1 0
Just a moment...

Elevate your app security with Azure AD by implementing multi-factor authentication, securing API access, and leveraging conditional access policies. Enhance your defense strategy today! #AppSecurity #AzureAD

0 0 0 0
Post image

Protect your Apple TV apps with advanced RASP+ runtime defense and AppiCrypt API integrity.

Go beyond basic checks to block tampering and API abuse.

πŸ”’ Read more: docs.talsec.app/appsec-artic...

#AppSecurity #DevSecOps

0 0 0 0
Post image

Is Yacine TV Safe to Use?

Many users ask if the Yacine TV app is safe since it’s not available on official app stores.

Learn how to use the app more safely before installing: yacinetvsapk.com

#YacineTV #StreamingApps #AppSecurity #TechReview

0 0 0 0
Preview
Hacked Prayer App Weaponised to Send Surrender Messages to Iranians A Muslim prayer app was compromised to push surrender messages to Iranian users during Israeli airstrikes, raising urgent questions about civilian app security.

Hacked Prayer App Weaponised to Send Surrender Messages to Iranians

#Cybersecurity #Iran #InfoWar #AppSecurity #MiddleEast #AusNews

thedailyperspective.org/article/2026-03-01-hacke...

0 0 0 0
Overview of one repo

Overview of one repo

πŸ§‘β€πŸŽ“ As part of my homework on AI from an AppSec perspective, I have decided to gather all my content on GitHub so that I can share it in case anyone is interested.

πŸ“– Cheat sheet, methodology and tools: github.com/righettod/to...

πŸ”¬ R&D: github.com/righettod/po...

#appsec #appsecurity #ai

1 1 0 0
Post image

Is Yacine TV App Safe to Use? Full Security Review

Before installing any third-party streaming app, safety comes first. We analyzed Yacine TV by checking its permissions, running security tests, and reviewing user feedback.
yacinetvsapk.com/yacine-tv-ap...

#YacineTv #AppSecurity #StreamingApp

0 0 0 0
Preview
Android mental health apps with 14.7M installs filled with security flaws Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.

Android mental health apps with 147M installs were found riddled with security flaws β€” when care meets code, privacy must be non-negotiable. πŸ“±πŸ§  #AppSecurity #HealthDataProtection

0 0 0 0
Post image

1,575 vulnerabilities found in 10 Android mental health apps (14.7M+ installs).
Issues include weak token generation, local data exposure, missing root detection.
These apps store therapy transcripts and CBT notes.
Are digital health apps secure enough?
#CyberSecurity #AndroidSecurity #AppSecurity

1 1 0 0
Preview
Most Dangerous Mobile Apps in 2026 That Can Secretly Steal Your Data - DevPathshala Dangerous mobile apps in 2026 that secretly steal data. Learn how these apps spy on you and how to stay safe.

Most β€œfree” apps hoard more data than they need, from pregnancy trackers to flashlights, then quietly ship it to third parties. If an app wouldn’t survive without spying, maybe it shouldn’t. #AppSecurity #DarkPatterns #Infosec
devpathshala.com/most-dangero...

3 1 0 0
Preview
Choosing Android App Development Services for Security Cyber threats to mobile apps rise each year sharply. Users lose data and trust from weak spots. Android app development services protect…

Choosing Android App Development Services for Security

Discover key factors like secure coding practices, encryption standards, regular testing, & industry expertise to ensure your mobile app remains safe & reliable for users.
Read More: medium.com/@cssoftsolut...

#AndroidDevelopment #AppSecurity

0 0 0 0
Preview
Web Application Firewall Market Size, Share, Analysis 2035 Web Application Firewall Market is Estimated to Reach a Valuation of $ 44.15B By 2035, Reaching at a CAGR of 16.37% During 2025 - 2035 | Solutions Drives Market Growth

Web Application Firewall Market Size, Share, Analysis 2035 www.marketresearchfuture.com/reports/web-...
#WebApplicationFirewall #CyberSecurity #ICTInnovation #SmartSecurity #EmergingTech #DigitalProtection #AppSecurity

0 0 0 0
Post image

πŸš€ The Role of Staff Augmentation in Enhancing Web Application Security
Learn how staff augmentation helps strengthen web app security by adding specialized expertise.

πŸ‘‰ Read the full article:
www.ortussolutions.com/blog/the-rol...

#WebSecurity #StaffAugmentation #AppSecurity #DevOps

0 0 0 0
Preview
App Permissions and Security Basics: Essential iOS Interview Questions with Expert Answers Nail your iOS interview with expert answers on permissions, Keychain, App Transport Security, and iOS security best practices.

I just published App Permissions and Security Basics: Essential iOS Interview Questions with Expert Answers medium.com/p/app-permis...
#iOS #iOSDeveloper #Swift #iOSSecurity #AppSecurity #MobileSecurity #iOSInterview #TechInterview #AppleDeveloper #Keychain #Biometrics #SwiftUI #iOSDevelopment

0 0 0 0
Execution of the POC performed.

Execution of the POC performed.

πŸ§‘β€πŸŽ“ Learning of the day for me thanks to @pentesterlab.com and Claude.

πŸ”¬ For the regular expression "[A-z]":

In a character class [X-Y], it matches all characters with ASCII codes from X to Y inclusive. So [A-z] means all ASCII characters from 65 (A) to 122 (z).

#appsec #appsecurity

4 1 1 0
Post image

ICYMI, Jan. 26–30 is #DataPrivacyWeek. Check out this short post and quick guide to privacy settings for 18 common apps from @wizertraining!

tinyurl.com/privacy-sett...

#AppSecurity #MobileSafety #OnlinePrivacy #OnlineSafety #StayWizer

0 0 0 0
POC performed.

POC performed.

πŸ§‘β€πŸŽ“ Learning of the day for me: I discovered that browsers (at least Chromium) display an SVG image even if the specified content type is set to XML. The contained JS script is also executed.

#appsec #appsecurity

6 2 3 0
Post image

Firehound reveals massive data leaks in App Store apps, exposing millions of users' personal info. Time for developers to prioritize security! #DataPrivacy #AppSecurity #FirehoundFindings Link: thedailytechfeed.com/firehound-re...

0 0 0 0
Overview of the page.

Overview of the page.

πŸ“‘ OWASP Secure Headers Project: We have added information and examples regarding the Trusted Types feature of the Content-Security-Policy header.

πŸ“– owasp.org/www-project-...

#appsec #appsecurity #owasp_shp

0 1 0 0
Preview
How VAPT Strengthens Mobile App Security: Essential Insights for Business Owners Discover how VAPT enhances mobile app security, identifies vulnerabilities, ensures compliance, & protects business data from cyber threats for business owners.

How VAPT Strengthens Mobile App Security: Essential Insights for Business Owners

πŸ“– Read here: www.linkedin.com/pulse/how-va...

#MobileAppSecurity #VAPT #CyberSecurity #DataProtection #BusinessSecurity #PenetrationTesting #VulnerabilityAssessment #AppSecurity #ECSInfotech #ECS

0 0 0 0
Preview
Unmasking "Wonderland" – The New Wave of Android Droppers & SMS Stealers In this episode of Upwardly Mobile, we dive deep into the evolving landscape of Android malware. We break down the emergence of Wonderland (formerly WretchedCat), a sophisticated SMS stealer targeting users in Uzbekistan through legitimate-looking "dropper" applications. We explore how threat actors, specifically the "TrickyWonders" group, are leveraging Telegram and malicious ad campaigns to bypass security checks and hijack devices. We also discuss the broader trend of Malware-as-a-Service (MaaS), including new threats like Cellik, Frogblight, and NexusRoute that are lowering the barrier to entry for cybercriminals globally. From real-time screen streaming to bypassing Google Play protections, we analyze the tactics defining modern mobile security threats. Key Topics Discussed: - The Rise of Droppers: How malware operators are shifting from "pure" Trojans to "droppers" (like MidnightDat and RoundRift) that appear harmless to evade detection before deploying payloads. - Wonderland's Capabilities: How this malware establishes bidirectional communication to intercept OTPs, steal contacts, and execute USSD requests. - The MaaS Economy: A look at the "Cellik" RAT, which offers one-click APK building to bundle malware inside legitimate apps, and "Frogblight," which targets users via fake court documents. - Government Impersonation: How "NexusRoute" is targeting users in India by mimicking government service portals to steal financial data and UPI PINs. - Defense Strategies: The importance of blocking unknown source installations and monitoring for suspicious SMS/USSD patterns. Sponsored By: This episode is brought to you by Approov. Stop mobile app abuse and API misuse. Ensure that the requests your API handles are from the genuine mobile app running on a safe mobile device. πŸ‘‰ Visit our sponsor: https://approov.io/ Relevant Links & Source Materials: - The Hacker News: https://thehackernews.com/2025/12/android-malware-operations-merge.html - SC Media: https://www.scworld.com/brief/android-malware-wonderland-evolves-with-dropper-apps-targeting-uzbekistan - Cypro: https://www.cypro.se/2025/12/22/android-malware-operations-merge-droppers-sms-theft-and-rat-capabilities-at-scale/ Keywords: Android Malware, Wonderland, SMS Stealer, Dropper Apps, Mobile Security, Remote Access Trojan (RAT), TrickyWonders, Cybersecurity, One-Time Password (OTP) Theft, Malware-as-a-Service, Approov.Β  Β  Β 

πŸ“£ New Podcast! "Unmasking "Wonderland" – The New Wave of Android Droppers & SMS Stealers" on @Spreaker #androidmalware #approov #appsecurity #cybersecurity #infosec #mobilesecurity #technews #upwardlymobile #wonderlandmalware

0 0 0 0
Preview
Engenharia de software moderna Software virou infraestrutura social. Ele estΓ‘ no banco, no hospital, no transporte, no comΓ©rcio, na escola, no governo, no entretenimento

Engenharia de software moderna

#computer #computador #Technology #tecnologia #software #softwaredevelopment #softwareengineer #softwaredeveloper #engenharia #engenhariadesoftware #softwaretesting #segurancadigital #AppSecurity #devops #desenvolvimentoweb #mobile

www.moprius.com/2026/01/enge...

2 0 0 0
Preview
Securing Secrets in Android: What Actually Works in Production In Android apps, nothing on the client is truly secret. APKs can be decompiled, strings extracted,...

Securing Secrets in Android: What Actually Works in Production In Android apps, nothing on the client is truly secret . APKs can be decompiled, strings extracted, memory inspected, and runtime beha...

#android #androiddev #appsecurity #kotlin

Origin | Interest | Match

1 0 0 0

Security concerns emerged regarding F-Droid's build server, currently managed by a long-time contributor. This raises questions about transparency and potential risks compared to professional hosting solutions. #AppSecurity 3/6

0 0 1 0
Post image

Secure your mobile apps: encrypt data, test regularly, and stay updated with security patches. #AppSecurity #TechTips
#softwaredevelopment
Visit our website www.maxvisionsolutions.com

1 0 0 0

GitHub just rolled out the ability for orgs to control who can request new apps. This is a game-changer for IT teams trying to manage app sprawl and security. No more random requests from everyone! Finally. πŸ”’ #GitHub #AppSecurity

1 0 0 0
Preview
Duende IdentityServer v7.4 is now available Duende IdentityServer v7.4 is here! Full compatibility with .NET 10 LTS, plus a standards-based foundation for agentic AI systems and MCP.

Duende IdentityServer v7.4 is here! πŸŽ‰ Shipping with .NET 10 LTS, so you can modernize your apps and build solutions engineered to last. πŸ”

duende.link/5pwbntg

#Duende #IdentityServer #dotnet10 #LTS #AppSecurity

0 0 0 0

The "Freedom Chat" app itself leaked plaintext PINs & user data due to poor development practices like lacking rate limiting & proper data serialization. A stark reminder of basic security principles being overlooked. πŸ€¦β€β™€οΈ #AppSecurity 4/6

0 0 1 0
Preview
It’s an API, do I really need to escape anything? - Treblle Escaping output is often overlooked in APIs, but it’s crucial for preventing security vulnerabilities like XSS attacks. Even when returning JSON, unsafe characters can lead to risks if not properly es...

πŸ’‘ Very interesting article about output escaping in an API context:

#appsec #appsecurity #api

treblle.com/blog/api-esc...

6 1 1 0