Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Chinese Hackers & the React2Shell Crisis
|
Dec 08, 2025 |
|
Sanchar Saathi |The Mobile App Triggering India's Surveillance Firestorm
|
Dec 02, 2025 |
|
Supply Chain Security Unpacked: Combating Dependency Confusion & Poisoned Pipelines
|
Nov 27, 2025 |
|
How Aisura 'Turbo Mirai' Botnet Reshaped Mobile DDoS Warfare
|
Nov 24, 2025 |
|
Black Friday's Hidden Threat: Stopping AI-Powered Fraud and Mobile Commerce Exploits
|
Nov 21, 2025 |
|
X Joins App Fairness Coalition to Combat Monopolies
|
Nov 17, 2025 |
|
Standing Up to Extortion: Lessons from the Checkout.com Breach
|
Nov 15, 2025 |
|
The Edge Advantage: Why Cloudflare and Approov Outpace Zscaler in API Security?
|
Nov 07, 2025 |
|
App Store Revolution: Google Play Opens to Third-Party Payments (The Epic Games Aftermath)
|
Nov 03, 2025 |
|
NPM Nightmare: & Cloudflare AI That Secured End Users From 2 Billion Weekly Malicious Downloads
|
Oct 31, 2025 |
|
The Unseen Storm: Securing APIs and Protecting Against Key Exposure
|
Oct 27, 2025 |
|
UK Competition and Markets Authority (CMA) designate Apple and Google with Strategic Market Status
|
Oct 22, 2025 |
|
F5's Zero-Day Roadmap and the Unacceptable Risk to Mobile Apps & APIs
|
Oct 20, 2025 |
|
Corporate Extortion and the Fall of BreachForums: Tracking ShinyHunters
|
Oct 14, 2025 |
|
Next Generation Attestation to Secure Mobile Apps Against Threats from AI
|
Oct 11, 2025 |
|
Big Tech's Gamble: Lawsuits Challenge Apple, Google, and Meta Over Social Casino Apps
|
Oct 05, 2025 |
|
How Misconfigured Firebase Servers Exposed User Credentials and Private Data?
|
Oct 03, 2025 |
|
Neon's Data Disaster: How a Viral AI App Exposed 75,000 Users and Went Dark
|
Sep 29, 2025 |
|
Google's Legal Gauntlet: Antitrust Battles and the Future of the App Ecosystem
|
Sep 26, 2025 |
|
How Secure Are eSIMs? Exploring Myths and the Reality of Digital SIM Cards
|
Sep 22, 2025 |
|
Apple's Leap in iOS Security: Unpacking Memory Integrity Enforcement (MIE)
|
Sep 14, 2025 |
|
What the App Store Freedom Act Means for Developers and Consumers?
|
Sep 02, 2025 |
|
Anatsa Unleashed | Android Banking Trojan Targets Over 830 Financial Apps Globally
|
Aug 28, 2025 |
|
Apple's iOS Obfuscation Dilemma: App Store Rejection & Developer Security Challenges
|
Aug 18, 2025 |
|
AI vs AI | Agentic AI Security: Top Threats & Best Practices for Apps and APIs
|
Aug 15, 2025 |
|
From Vibe to Venture: Building and Securing Your Mobile Apps and APIs
|
Aug 11, 2025 |
|
Japan says Apple's Must Lift Browser Ban | Billions at Stake, and the Fight for Open Web on iOS
|
Aug 08, 2025 |
|
Beyond the Beta: iOS 26 Features, AI, and Next-Gen App Security
|
Aug 07, 2025 |
|
Tea App Breach Exposed 72,000 Selfies & IDs: Urgent Lessons for Mobile API Security
|
Aug 04, 2025 |
|
Securing the Cloud | Unlocking True Mobile & API Security
|
Aug 01, 2025 |
|
Crypto Under Siege: $2.5 Billion Lost in H1 2025 and the Battle for Web3 Security
|
Jul 28, 2025 |
|
Unmasking Konfety: How Remote App Attestation Defeats Evil Twin Malware
|
Jul 24, 2025 |
|
The Fitify Fiasco: Unpacking 300K Photos Exposed via Hardcoded App Secrets!
|
Jul 21, 2025 |
|
The $7M Blindspot: Mobile App Security's Hidden Costs and Fortifying APIs with Zero Trust
|
Jul 17, 2025 |
|
Smart Home Security: Navigating IoT Risks with Advanced Mobile App Protection
|
Jul 14, 2025 |
|
Unlocking Zero Trust for Mobile Apps: Bridging the Security Gap
|
Jul 11, 2025 |
|
Qantas Under Siege: Unpacking the Third-Party Data Breach & Scattered Spider's Threat
|
Jul 07, 2025 |
|
Fortify Your Phone: Android 16's Advanced Security Features
|
Jul 04, 2025 |
|
Independence Day: Cloudflare's Dual Defense for Mobile Apps & Original Content
|
Jul 02, 2025 |
|
Unpacking the WestJet Cyberattack | Mobile API Security & Threats to Airlines
|
Jun 30, 2025 |
|
Apple's EU App Store Overhaul | Fees, Fines, and the Fight for DMA Compliance
|
Jun 28, 2025 |
|
Why the Open App Markets Act Matters?
|
Jun 25, 2025 |
|
The 16 Billion Credential Crisis: Blueprint for Mass Exploitation
|
Jun 25, 2025 |
|
Securing Critical Mobile Medical Apps | FDA Regulations & Cybersecurity
|
Jun 23, 2025 |
|
GodFather Malware | The Virtual App Deception You Won't See Coming
|
Jun 20, 2025 |
|
Google Play Store Crypto Scam | Protecting Your Wallets from Malicious Apps!
|
Jun 17, 2025 |
|
App Store Fees Exposed: Maximize Your Revenue & Bypass the 30% Cut
|
Jun 12, 2025 |
|
Caught Red-Handed: Meta & Yandex's Covert Android Surveillance!
|
Jun 09, 2025 |
|
Coinbase Strikes Back: $20M Bounty on Cyber Extortionists
|
Jun 06, 2025 |
|
Hacking Volkswagen's Mobile App | A Car Security Breach
|
Jun 04, 2025 |
|
Apple vs Samsung vs Xiaomi: Who is Dominating the Smartphone Battle?
|
Jun 02, 2025 |
|
North Korea's Crypto Heists | Mobile App and API Threats
|
May 23, 2025 |
|
Beyond Code Obfuscation | The Non-Negotiable Shift to Dynamic Mobile App Security
|
May 18, 2025 |
|
Fair Play: How Competition Drives UK Growth & Challenges Big Tech's AppStore Power
|
May 15, 2025 |
|
The Signal Clone Crisis: Mike Waltz, TeleMessage, and the Hack That Exposed Sensitive Comms
|
May 13, 2025 |
|
Securing AI Agentic Mobile API Access
|
May 08, 2025 |
|
Xiaomi Explores Google-Free HyperOS with Huawei and BBK
|
May 02, 2025 |
|
Apple Blasted by Judge: Lying Under Oath and Losing App Store Control -
|
May 01, 2025 |
|
The Good, The Bad, and The Ugly in Mobile Encryption
|
Apr 26, 2025 |
|
The 92% Problem: Why Obfuscation Fails and Dynamic Security is Essential
|
Apr 21, 2025 |
|
The Critical Imperative of Mobile App Security in 2025
|
Apr 18, 2025 |
|
Apple Under Scrutiny: The EU's DMA in Action
|
Apr 14, 2025 |
|
The Growing Threat to Mobile APIs: Leaks, Lapses, and Robust Defences
|
Apr 10, 2025 |
|
Securing Mobile Apps: Approov's Award-Winning Attestation Technology
|
Apr 02, 2025 |
|
Google Goes Private: The Future of Android Development
|
Mar 30, 2025 |
|
Unlocked and Unsafe? The Truth About iOS Jailbreaking
|
Mar 29, 2025 |
|
The Man-in-the-Middle Threat: Understanding and Preventing MitM
|
Mar 20, 2025 |
|
Beyond DexGuard: Exploring Advanced Layers of App Protection
|
Mar 18, 2025 |
|
Secrets Sprawl: The Mobile Security Threat
|
Mar 14, 2025 |
|
Unpacking Mobile Malware: Earth Minotaur, Gamaredon, and GodLoader Threats
|
Mar 10, 2025 |
|
Samsung Galaxy S25 | A Quantum Leap in Mobile Security?
|
Mar 02, 2025 |
|
TgToxic Android Trojan: A Masterclass in Banking Malware
|
Feb 26, 2025 |
|
Quokka: Mobile App Security Intelligence for Risk-Based Decisions
|
Feb 23, 2025 |
|
Zero Trust for Mobile Healthcare: Protecting ePHI on Personal Devices
|
Feb 19, 2025 |
|
HarmonyOS Next: A True Android Alternative?
|
Feb 16, 2025 |
|
Apple App Store Security Fail: The Fake LastPass Story
|
Feb 16, 2025 |
|
Mobile Money, Mobile Risk: Securing Africa's Fintech Future
|
Feb 11, 2025 |
|
Is DeepSeek Safe? Navigating the Risks of the Chinese AI Model
|
Feb 09, 2025 |
|
Frida: Friend or Foe? Protecting Your Mobile Apps from Dynamic Instrumentation
|
Feb 08, 2025 |
|
China Challenges Apple: App Store Fees and Developer Freedom
|
Feb 07, 2025 |
|
Who's Tracking You? The Shocking Gravy Analytics Data Breach
|
Feb 06, 2025 |
|
Mapping Africa's Cybersecurity Development
|
Feb 02, 2025 |
|
UK Watchdog Targets Apple and Google: Mobile Ecosystems Under Scrutiny for Stifling Innovation
|
Jan 30, 2025 |
|
Digital Markets Act Under Scrutiny: Fair Competition or Tech Giant Tussle?
|
Jan 28, 2025 |
|
The Data Gold Mine | How Car Manufacturers are Monetizing Your Driving Habits
|
Jan 27, 2025 |
|
Is Code Obfuscation Still Effective in the Age of AI?
|
Jan 25, 2025 |
|
India's App Store Showdown: Will Apple and Google Bend to Government Demands?
|
Jan 23, 2025 |
|
Open Mobile Hub - Revolutionizing Mobile App Development
|
Jan 20, 2025 |
|
Little Red Book, Big Data Risk: The REDnote Security Threat
|
Jan 19, 2025 |
|
The Coalition for App Fairness - Japan's SSCPA Law
|
Jan 15, 2025 |
|
Apple Under Fire: £1.5 Billion App Store Lawsuit
|
Jan 13, 2025 |
|
Flexion | Level Up Your Revenue + How to Reduce App Store Fees & Combat Cheating
|
Jan 12, 2025 |
|
Mobile Security Threats to Connected Car Apps
|
Jan 10, 2025 |
|
FireScam Android Malware: How Fake Telegram Premium Apps Exploit Firebase for Stealth Attacks
|
Jan 09, 2025 |
|
Epic Games Store Pre-loads Millions of Telefónica Android Devices
|
Jan 07, 2025 |
|
Pegasus Spyware! | Widespread Mobile Infections reported by iVerify
|
Jan 06, 2025 |
|
Apple's $95 Million Siri Privacy Settlement
|
Jan 04, 2025 |
|
Dirty Secrets | Exposed API Key Vulnerabilities in Mobile Apps
|
Jan 04, 2025 |
|
HIPAA Security Rule Updates and Cybersecurity in Mobile Healthcare
|
Jan 02, 2025 |
|
Exploring the OpenWallet Foundation (OWF) - Interoperable Digital Wallets
|
Jan 01, 2025 |
|
US Treasury Department: Chinese Hackers Exploit API Vulnerability
|
Dec 31, 2024 |
|
The Prometheus Security Breach | 300K Instances Exposed!
|
Dec 30, 2024 |
|
Apple DeviceCheck and AppAttest Limitations
|
Dec 28, 2024 |
|
Mobile API Security | Closing the Protection Gap with a Mobile SDK
|
Dec 23, 2024 |
|
Zero Trust Mobile Security with Approov
|
Dec 20, 2024 |
|
TikTok Ban Upheld | A Legal Showdown
|
Dec 16, 2024 |
|
Over-the-Air Updates | Essential for Mobile App Security in the AI Age
|
Dec 14, 2024 |
|
Atrium Health Data Breach Impacts 585,000
|
Dec 14, 2024 |
|
Is Direct-to-Consumer the Future of Mobile Apps Distribution?
|
Dec 13, 2024 |