arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Introduction

Discover curated AppSec articles, guides, and research on mobile app and API security, covering rooting, hooking, Flutter security, RASP, AppiCrypt, and practical threat detection techniques.

hashtag
Featured AppSec Collections

chevron-rightMobile and API Threat Detection & Defense (Rooting, Hooking, Reverse Engineering)hashtag

Technical articles focused on advanced strategies to detect and defend against mobile threats, including rooting, hooking, reverse engineering, and API abuse.

chevron-rightTalsec RASP+, AppiCrypt and freeRASP Guides and Featureshashtag

This collection highlights cutting-edge tools and resources from Talsec designed to secure mobile apps through runtime application self-protection (RASP), API integrity checks, and anti-abuse measures.

chevron-rightOWASP TOP 10 for Flutterhashtag

Series of artiles written by Majid Hajian discussing each threat of OWASP TOP 10, in context of Flutter and its security.

chevron-rightFlutter Securityhashtag

At Talsec, we’re proud to lead the way as the #1 Flutter Security SDK, and our commitment to this growing framework runs deep. This curated collection showcases our ongoing efforts to protect Flutter apps.

chevron-rightReports & Original Researchhashtag

In-depth reports and original research articles focused on mobile app security, fraud prevention, and API protection.

chevron-rightTalsec Mobile App Security Conference 2025hashtag

Summary of talks and keynotes from Talsec Mobile App Security Conference 2025 in shortened article form with video attached as well.

hashtag
Latest Articles

Articles by our team members and guest experts () that explore practical mobile security and threat defense topics for the developer community.

Build secure apps in React Native

OWASP Top 10 For Flutter - M5: Insecure Communication for Flutter and Dart

OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart

OWASP Top 10 For Flutter – M7: Insufficient Binary Protection in Flutter & Dart

OWASP Top 10 For Flutter – M8: Security Misconfiguration in Flutter & Dart

OWASP Top 10 For Flutter – M9: Insecure Data Storage in Flutter & Dart

OWASP Top 10 For Flutter – M10: Insufficient Cryptography in Flutter & Dart

How to Hack & Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)

How to Hack & Protect Flutter Apps — OWASP MAS and RASP. (Pt. 2/3)

How to Hack & Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)

Missing Hero of Flutter World

Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft

5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

Keynote: Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec)

Keynote: Cloudflare for AppSec with Anatol Nikiforov (Cloudflare)

Keynote: Fingerprinting, Device Intel & Context with Martin Makarský (Fingerprint)

TechTalk: Threshold Cryptography with Jan Kvapil (MUNI)

TechTalk: Best Practices for Keeping Your App Safe with Majid Hajian (Microsoft)

TechTalk: Predictive Apps Protection with Sergiy Yakymchuk (Talsec)

Opening Keynote: Safety/Security Equilibrium with Sergiy Yakymchuk (Talsec)

How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps
Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources
Emulators in Gaming: Threats and Detections
Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise
Detect system VPNs with freeRASP
Safeguarding Your Data in React Native: Secure Storage Solutions
Obfuscation of Mobile Apps
React Native Secure Boilerplate 2024: Ignite with freeRASP
Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative
Introducing Talsec’s advanced malware protection!
Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️
OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter
OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter
OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter
OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter
Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources
User Authentication Risks Coverage in Flutter Mobile Apps | TALSEE
Secure Storage: What Flutter can do, what Flutter could do
🔒 Flutter Plugin Attack: Mechanics and Prevention
Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs
How to test a RASP? OWASP MAS: RASP Techniques Not Implemented [MASWE-0103]
Flutter CTO Report 2024: Flutter App Security Trends
Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention
Keynote: Discovering the Power of AI Pentesting with Pedro Conde (Ethiack)
Keynote: Red Teaming in Practice with Adam Žilla (Haxoris)
Keynote: Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab)
Keynote: 20 Minutes to Banking-Grade Security with Mateusz Wojtczak (LeanCode)
become one of themarrow-up-right
Cover

How to Stop Bots Without CAPTCHA

Cover

Opening Keynote: Safety/Security Equilibrium with Sergiy Yakymchuk (Talsec)

Cover

TechTalk: Predictive Apps Protection with Sergiy Yakymchuk (Talsec)

Cover

TechTalk: Best Practices for Keeping Your App Safe with Majid Hajian (Microsoft)

Cover

OWASP Top 10 For Flutter – M10: Insufficient Cryptography in Flutter & Dart

Cover

Android Malware Detection SDK for Your App: Detect Risky & Suspicious Apps and Known Malware

Cover

OWASP Top 10 For Flutter – M9: Insecure Data Storage in Flutter & Dart

Cover

OWASP Top 10 For Flutter – M8: Security Misconfiguration in Flutter & Dart

Cover

OWASP Top 10 For Flutter – M7: Insufficient Binary Protection in Flutter & Dart

Cover

Talsec RASP+ and AppiCrypt for Apple TV Apps

Cover

TechTalk: Threshold Cryptography with Jan Kvapil (MUNI)

Cover

Keynote: Fingerprinting, Device Intel & Context with Martin Makarský (Fingerprint)

Cover

How To Detect Video Injection for KYC

Cover

Keynote: Cloudflare for AppSec with Anatol Nikiforov (Cloudflare)

Cover

Keynote: Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec)

Cover

Keynote: 20 Minutes to Banking-Grade Security with Mateusz Wojtczak (LeanCode)

Cover

Keynote: Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab)

Cover

Keynote: Red Teaming in Practice with Adam Žilla (Haxoris)

Cover

Keynote: Discovering the Power of AI Pentesting with Pedro Conde (Ethiack)

Cover

How to Detect Jailbreak using Capacitor

Cover

How to Detect Hooking using Capacitor

Cover

freeRASP for Kotlin Multiplatform Guide

Cover

Achieving Cloudflare Outage Resilience using AppiCryptWeb

Cover

How to Detect Root on React Native

Cover

How to Detect Jailbreak on React Native

Cover

How to Prevent Magisk Root Hiding and Security Bypass

Cover

How to Detect Hooking (Frida) on React Native

Cover

How to Detect a Weak Wi-Fi: Guide to In-App Network Security Checks

Cover

Future-Proofing for the Data-Driven Ecosystem: Securing Your Application and Data APIs

Cover

freeRASP for Unreal Engine: Secure Your Revenue

Cover

How to Detect Screen Capture & Recording using Kotlin

Cover

How to Detect Developer Mode on Android using Kotlin

Cover

How to Detect App Tampering & Repackaging using Kotlin

Cover

How to Detect Jailbreak on Flutter

Cover

How to Detect Root on Flutter

Cover

How to Detect Hooking (Frida) on Flutter

Cover

How Secure Are Flutter Apps?

Cover

How to Detect Emulator in Kotlin

Cover

How to Detect Root using Kotlin

Cover

How to Detect Jailbreak using Swift

Cover

How to Detect Hooking (Frida) using Kotlin

Cover

How to Detect Hooking (Frida) using Swift

Cover

How to Detect VPN using Swift

Cover

How to Detect VPN using Kotlin

Cover

AppiCrypt Against Time Spoofing: From Free Trial Abuse to License Fraud and Audit Log Corruption

Cover

Preventing Piracy and Cheating in Games: A Guide to Countering GameGuardian with Talsec

Cover

iOS Keychain vs. Android Keystore

Cover

Introducing Multi-Instancing Detection for freeRASP

Cover

Introducing the Talsec Portal: A New Way to Monitor Your App — Try It Now!

Cover

How to Achieve Root-Like Control Without Rooting: Shizuku's Perils & Talsec's Root Detection

Cover

freeRASP for Unity Guide [new!]

Cover

ApkSignatureKiller: How it Works and How Talsec Protects Your Apps

Cover

AI Device Risk Summary Demo | Threat Protection | Risk Scoring | Malware Detection | Android & iOS

Cover

Podcast: iOS Keychain vs Android Keystore

Cover

Obfuscation of Mobile Apps

Cover

OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart

Cover

Simple Root Detection: Implementation and verification

Cover

Flutter - M5: Insecure Communication for Flutter and Dart

Cover

OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter

Cover

OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter

Cover

OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter

Cover

OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter

Cover

🚀A Developer’s Guide to Implement End-to-End Encryption in Mobile Apps 🛡️

Cover

Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources

Cover

Learn how to implement the Secure Storage in Flutter and understand storage restrictions.

Cover

Dive into our full guide as Himesh Panchal walks you through creating a robust and secure authentication flow!

Cover

Introduction: Root Detection Basics

Cover

OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter

Cover

Hook, Hack, Defend: Frida's Impact on Mobile Security & How to Fight Back

Cover

Emulators in Gaming: Threats and Detections

Cover

Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs

Cover

How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps

Cover

How do you test a RASP? This guide will walk you through the entire process of RASP evaluation. It is written for penetration testers and RASP integrators.

Cover

Fact about the origin of the Talsec name

Cover

React Native Secure Boilerplate 2024: Ignite with freeRASP

Cover

Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise

Cover

Flutter CTO Report 2024: Flutter App Security Trends

Cover

Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative

Cover

Detect system VPNs with freeRASP

Cover

Introducing Talsec’s advanced malware protection!

Cover

Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention

Cover

Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️

Cover

Safeguarding Your Data in React Native: Secure Storage Solutions

Cover

Secure Storage: What Flutter can do, what Flutter could do

Cover

🔒 Flutter Plugin Attack: Mechanics and Prevention

Cover

Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft

Cover

Build secure apps in React Native

Cover

How to Hack & Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)

Cover

How to Hack & Protect Flutter Apps — OWASP MAS and RASP. Use them and your project will cut the mustard! (Pt. 2/3)

Cover

How to Hack & Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)

Cover

freeRASP meets Cordova

Cover

Philosophizing security in a mobile-first world

Cover

5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

Cover

Missing Hero of Flutter World