The Mobile App Security Library
-
AI & the future of cybersecurity
App Threat Report 2026 Q1: The State of Code Obfuscation Against AI
Discover what happened when Promon's security team tested leading AI models against OLLVM obfuscation. Where did mobile app code protection hold up and where did it fall short? What are the key takeaways and recommendations for security and product teams?26 Mar 2026
Dr. Anton Tkachenko
-
Malware and the threat landscape
Protection is not intelligence: Why blocking mobile threats is no longer enough
Uncover the cost of mobile app protection without intelligence. Discover the plan to take you from protection to intelligence, and the products that transform protection into intelligence.18 Mar 2026
Volker Gerstenberger
-
Mobile app security
On-prem vs cloud for mobile app protection: A guide to customer choice
What are the main deployment options available for mobile app security products? Does an on-prem or cloud model best suit your organizational needs?12 Mar 2026
Andrew Whaley
-
Mobile app security
Three reasons why your payment app needs to get EMVCo certified: How app shielding can help you get there
This paper will look at the three main reasons why mobile payment apps need to get EMVCo certified and the benefits of EMVCo SBMP certified Software Protection Tool solutions.3 Mar 2026
Morten Ruud
-
Mobile app securityFramework migration and mobile app security: Prevent coverage gaps as code changes
Learn about the main risks after a framework migration, what scenarios trigger a mobile app security re-evaluation, and how to protect your code.26 Feb 2026
Andrew Whaley
-
Mobile app securityThe revenue leak you don’t see: When attackers rewrite your monetization rules
Discover the common routes attackers use to change mobile app monetization outcomes with their business impacts. Learn how to reduce revenue loss upstream and check for on-device bypasses, whatever your industry.19 Feb 2026
Byron McNaught
-
ComplianceInside an EMVCo evaluation: What labs test and how to prepare
Recognize the business case for EMVCo SBMP certification and why it matter now. Discover what labs examine during an evaluation, where mobile payment apps fail, and how teams can prepare effectively.12 Feb 2026
Morten Ruud
-
Mobile app security
Mobile game security in Unity and Unreal: Reducing cheat ROI at runtime
How do attackers exploit runtime logic in Unity and Unreal engine mobile games? What does runtime hardening change for integrity, trust, and revenue?10 Feb 2026
Byron McNaught
Blogs
Keep up with the latest developments in iOS and Android security, code obfuscation, compliance, API protection, and more.
View all-
Retail & e-commerceHow a major fast-food chain secured its customer loyalty app
-
Public sectorHow a government agency improved citizen data protection
Customer stories
From startups to multi-nationals, learn how our customers stay secure with Promon.
View allWebinars & events
Attend a webinar, meet us at industry events, and secure your spot at exclusive Promon-hosted sessions.
View allJul 5, 2023
How to hack (and secure) an Android app
Dec 14, 2023
2024 cybersecurity predictions
Apr 11, 2024
Dispelling the myth: Is iOS more secure than Android?
-
PCI DSS compliance checklist
Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards. -
Beginner's guide to code obfuscation
Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses. -
StrandHogg 2.0: A new Android vulnerability
Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
Ebooks & whitepapers
Download detailed mobile app protection checklists, reports, ebooks, and more.
View all-
Compliance
Mobile payments on COTS: How to comply with PCI MPoC
16 min read 10 Jun 2025Learn how the PCI MPoC Standard secures mobile payment apps on COTS devices, with detailed compliance domains, modules, and essential security requirements. -
Compliance
Navigating Germany's BSI cybersecurity requirements for digital health applications (DiGAs)
9 min read 2 Jun 2025German DiGA providers face strict BSI data security standards. Learn how to secure your app, stay compliant, and protect your users and reputation in the healthcare market. -
Mobile app security
A guide to Zero Trust for your mobile apps
7 min read 27 May 2025A strategic roadmap for extending Zero Trust to mobile apps, offering runtime protection insights and boardroom-ready justifications. -
Mobile app security
The ultimate guide to code obfuscation for security professionals
16 min read 8 May 2025Code obfuscation helps protect your code and app data. Here's an in-depth guide on how it works and what you can do to improve your app's security.
Knowledge Center
Get the A-Z on everything from app shielding and obfuscation to AI in cybersecurity.
View all-
FreeDatabaseComing soon
Promon Global App Security Compliance Handbook
Maintain mobile app security compliance by leveraging our comprehensive global legal database, designed to help you stay compliant and secure as your organization expands. -
FreeGame
Rapper or Malware?
Test your knowledge! Can you distinguish between rappers and malware names? Boost your app security awareness and brush up on hip-hop trivia.
Tools & games
Get insight into your mobile app security risk with our calculators, databases, quizes, and games.
View all-
Application programming interface (API)
APIs are rules and protocols that allow apps to communicate and exchange data with each other by defining how requests are made and how responses are received. -
Telemetry
Telemetry collects, transmits, and analyzes data from remote devices to monitor performance and user behavior, helping you identify potential vulnerabilities and threats. -
OWASP
OWASP is a non-profit that provides free tools, standards, and frameworks to help build secure software and guides security best practices. -
Encryption
Encryption protects sensitive data by converting it into a coded format that can only be read by someone with the proper decryption key. In the context of mobile security, encryption safeguards data both at rest (stored on the device) and in transit (sent over networks). This prevents unauthorized access and ensures that even if data is intercepted, it cannot be deciphered without the decryption key.
Glossary
Unpack all the technical jargon and gain a better understanding of the mobile app security industry.
View allStay ahead with expert insights
-
Discover our mission
Learn how we’re revolutionizing app security to protect what matters most.
About us -
Have any questions or feedback?
We value your input. Whether you have suggestions, inquiries, or just want to share your thoughts, our team is here to help.
Contact us