API Security – Analysis, News and Insights

Strategies to Stop Credential Stuffing Attacks on Mobile Apps
Identity-based and social engineering attacks are surging in 2024. Stolen credentials give hackers immediate access and control… and an instant path to stealing data and orchestrating ransomware attacks. Credential stuffing attacks ...

Securing API Keys: Why It Should Be Your Top Priority Now
I will cut to the chase in this blog. Protecting and managing the API keys MUST be number one on your security to-do-list. A wave of recent breaches show just how exposed ...

Enhance Cross-Platform Development with Robust Security Solutions
Cross-platform development tools such as Flutter and React Native are increasingly being used to develop mobile apps. The financial and organizational advantages of using such frameworks are becoming clearer and any perceived ...

Responding to and Recovering from Mobile App Security Breaches
Zero Trust says “assume breach” and your response plan must cover handling third-party security incidents too. Mobile apps depend on third party APIs, and you need to be prepared to act quickly ...

Why Isn’t Zero Trust Systematically Applied in Mobile App Security?
Here at Appoov, we were wondering why there has been so little discussion about applying the principles of Zero Trust specifically to mobile apps when this is a concept which has become ...

Privacy Risks in Google’s New Play Store Personalization
Personolization is a double edged sword. On one hand, it enhances user experiences by offering tailored recommendations, but on the other hand, it raises significant privacy concerns. Google Play's recent announcement about ...

The Rise of Unofficial Apps in Delivery, Automotive, and E-Commerce
Understanding the Security Risks and Solutions for Protecting Sensitive Data There is a trend emerging for anyone launching a consumer business. Almost every business these days does two things: the first is ...

How Poor API Security Led to Major Breaches in 2024
Major API Breaches in H1 of 2024 Earlier this year, we provided an overview of the significant security breaches from 2023. It's now clear that for API related breaches, this year is ...

Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
This overview outlines the development and adoption of Huawei HarmonyOS and the associated security solution Safety Detect, highlighting some limitations with the approach. As regulations such as the EU DMA force the ...

Streamlining the Defense Against Mobile App Bots
Let’s talk about bots. And be a little provocative. A review of bot solutions (see previous blog) reveals a common assumption that I think is misleading: Namely that separating good from bad ...