top of page
Search


MobSF: Hack Like a Pro, Secure Like a Boss
In our day-to-day life, mobile applications integrate into our lives, like our essential body parts. From food delivery to maps and finance management, they enhance convenience just like a wow! However, as our dependency on mobile app has increased, so does the critical need for robust cybersecurity measures. Therefore, mobile app testing has become an integral part of cybersecurity. Before going into the testing aspect, I recommend you get familiar with OWASP’s top 10 mobile
Aastha Thakker
3 min read


OWASP Top 10- Mobile Risks (PART — 2)
Hey, readers! Hope you’ve all understood the top 5 vulnerabilities from our last blog. Now, gear up for the Part 2 of the OWASP Top 10 mobile risks. We’re digging deeper into the rabbit hole, so get ready! Here is the link for previous Top 5 Vulnerabilities. M6: Inadequate Privacy Controls Application-specific privacy controls aim to safeguard Personally Identifiable Information (PII), like names, addresses, credit card details, email and IP addresses, and sensitive data on h
Aastha Thakker
8 min read
bottom of page