Blog

M1: Improper Credential Usage

A new addition to the 2024 list, this refers to the hard coding of credentials within source[…]

OWASP Mobile Top 10 – Overview & Comparison

Back in May 2024 the final version of the updated OWASP Mobile Top 10 security threats was[…]

OWASP Mobile Top 10

Back in 2016 one of our founders, Alec Tucker, gave some talks on mobile application security: In[…]