Mobile and API Threat Detection & Defense (Rooting, Hooking, Reverse Engineering)
Technical articles focused on advanced strategies to detect and defend against mobile threats, including rooting, hooking, reverse engineering, and API abuse.
Talsec RASP+, AppiCrypt and freeRASP Guides and Features
This collection highlights cutting-edge tools and resources from Talsec designed to secure mobile apps through runtime application self-protection (RASP), API integrity checks, and anti-abuse measures.
Flutter Security
At Talsec, we’re proud to lead the way as the #1 Flutter Security SDK, and our commitment to this growing framework runs deep. This curated collection showcases our ongoing efforts to protect Flutter apps.
Reports & Original Research
In-depth reports and original research articles focused on mobile app security, fraud prevention, and API protection.
Latest Articles
Articles by our team members and guest experts () that explore practical mobile security and threat defense topics for the developer community.
OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart
Simple Root Detection: Implementation and verification
Flutter - M5: Insecure Communication for Flutter and Dart
OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter
OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter
OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter
OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter
🚀A Developer’s Guide to Implement End-to-End Encryption in Mobile Apps 🛡️
Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources
Learn how to implement the Secure Storage in Flutter and understand storage restrictions.
Dive into our full guide as Himesh Panchal walks you through creating a robust and secure authentication flow!
Introduction: Root Detection Basics
OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter
Hook, Hack, Defend: Frida's Impact on Mobile Security & How to Fight Back
Emulators in Gaming: Threats and Detections
Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs
How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps
How do you test a RASP? This guide will walk you through the entire process of RASP evaluation. It is written for penetration testers and RASP integrators.
Fact about the origin of the Talsec name
React Native Secure Boilerplate 2024: Ignite with freeRASP
Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise