By topic
- Mobile app security
- Malware and the threat landscape
- Compliance
- AI & the future of cybersecurity
- Development
- Clear selection
By use case
- Prevent online fraud
- Protect revenue
- Ensure security compliance
- Block mobile malware
- Protect intellectual property
- Stop API abuse
- Reduce game cheating
- Fortify data & content
- Secure patient data
- Stop referral & promo misuse
- On-device AI security
- Clear selection
By product
- Promon SHIELD® for Mobile
- Promon SHIELD® for Desktop
- Promon IP Protection Pro™
- Promon App Attestation™
- Promon Asset Protection™
- Promon SDK Protection™
- Promon Insight™
- Clear selection
-
AI security threat model: a comprehensive approach
This new paper by Dr. Anton Tkachenko introduces a complete AI security framework for identifying, categorizing, and prioritizing risks across device, model, application, and agent levels. It also shows how Promon’s protection layers map to these threats to defend against real-world AI attacks. -
Resilience pentest readiness checklist for mobile apps
A resilience pentest verifies that your app stays secure against tampering, reverse engineering, and unsafe environments. Use this checklist to confirm built-in protections work and align with OWASP MASVS-R standards before testing begins. -
Regular pentest readiness checklist for mobile apps
A regular pentest verifies that your app securely handles data, authentication, and communication. Use this checklist to confirm alignment with OWASP ASVS and MASVS standards before testing begins. -
Gartner® Hype Cycle™ for Application Security, 2025
Explore essential app security innovations shaping 2025 in the latest Gartner Hype Cycle. -
PCI DSS compliance checklist
Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards. -
Beginner's guide to code obfuscation
Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses. -
PSD2 compliant with app shielding
Achieve PSD2 compliance with app shielding. Safeguard financial data, meet regulatory requirements, and build trust with secure banking apps. -
A deep dive into OWASP MASVS-Resilience
Master OWASP MASVS resilience with our in-depth guide. Enhance mobile app security, implement robust defenses, and meet industry-leading standards. -
DORA for financial apps: A practical approach to compliance
Get tools to comply with the EU's Digital Operational Resilience Act (DORA). Protect your financial apps and become compliant. -
Beware of Snowblind: A new Android malware
Uncover Snowblind's novel seccomp-based attack vector. Learn how this Android malware bypasses anti-tampering mechanisms and protect your apps from emerging threats. -
App Threat Report: The state of iOS app security
Explore iOS app security vulnerabilities. Discover encryption bypasses, repackaging risks, and real-world test results from 100 top iOS apps to enhance your security. -
App Threat Report: FjordPhantom malware defense in banking apps
Understand FjordPhantom malware's virtualization techniques. Learn how leading Android banking apps fare against this threat and improve your app's defenses. -
App Threat Report: The state of payment apps’ malware defense
Analyze payment app malware defense strategies. Gain insights on protecting financial transactions and securing your payment applications against evolving threats. -
App Threat Report: The state of financial services’ malware defense
Evaluate financial services malware defense. Discover best practices for securing banking and finance apps, and stay ahead of sophisticated cyber attacks. -
App Threat Report: The state of game security
Explore game security challenges and solutions. Learn how to protect your gaming apps from cheating, piracy, and malware to ensure fair play and user trust. -
App Threat Report: The state of repackaging
Review app repackaging prevention techniques. Safeguard your apps from unauthorized modifications, protect intellectual property, and maintain app integrity. -
App Threat Report: The state of hooking framework detection
Explore Frida detection and evasion techniques. Learn how to protect your apps from dynamic instrumentation, secure user data, and maintain app integrity. -
StrandHogg 2.0: A new Android vulnerability
Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
