You have now been logged out of the Support Portal.
You can also access the Support Portal using the following URL: https://support.promon.io/
Should you experience any issues or wish to contact us, please send email customer-success@promon.co.
Stay updated on the latest news on
application security
-
Security researchApp Threat Report 2025 Q4: The State of Facial Recognition Security
Explore the state of security for facial recognition systems in 2025. Discover how the facial recognition process works, as well as the main threat types and available countermeasures.3 Dec 2025
Benjamin Adolphi
-
Compliance
Transaction Risk Analysis under PSD2: Turning compliance into competitive advantage
Why secure mobile environments are essential for banks to safely reduce friction, protect revenue, and maintain PSD2 compliance.26 Nov 2025
Sven Klüver
-
AI & the future of cybersecurityFrom framework to action: A new roadmap for securing AI in mobile apps
Discover a new, comprehensive threat model for AI security in mobile apps that combines threat analysis, the latest solutions, and implementation strategies.13 Nov 2025
Dr. Anton Tkachenko
-
AI & the future of cybersecurityWhy prompt injection attacks are the emerging critical risk in mobile app security
Learn about the latest research and industry signals on prompt injection attacks. Uncover the present business impact and future growth of prompt injections in AI AppSec.29 Oct 2025
Dr. Anton Tkachenko
-
ComplianceMobile app pentest readiness guide: Understanding regular vs. resilience penetration testing
Learn the difference between regular and resilience pentests, why both matter for mature mobile security, and how to prepare your app for penetration tests with confidence22 Oct 2025
Simon Lardinois
-
AI & the future of cybersecurityHow to protect your AI-driven mobile apps against emerging security threats
Secure your embedded AI models, logic, and inputs where it matters most—inside the app14 Oct 2025
Dr. Anton Tkachenko
-
AI & the future of cybersecurityFrom hype to hardening: Vibe coding and mobile application security
Why vibe coding creates a security gap that demands runtime protection in mobile applications1 Oct 2025
Dr. Anton Tkachenko
-
AI & the future of cybersecurityEmerging threats in mobile AI: What businesses need to know
Why is mobile AI on the rise, what new threat surfaces has it created, and how should high-risk industries respond?25 Sep 2025
Morten Ruud
Blogs
Keep up with the latest developments in iOS and Android security, code obfuscation, compliance, API protection, and more.
View all-
PCI DSS compliance checklist
Streamline PCI DSS compliance with our security checklist. Ensure data security, protect customer information, and meet industry standards. -
Beginner's guide to code obfuscation
Learn app code obfuscation with our expert guide. Protect intellectual property, prevent reverse engineering, and strengthen your app's defenses. -
StrandHogg 2.0: A new Android vulnerability
Understand the StrandHogg 2.0 Android vulnerability. Learn about this serious security threat, protect your apps, and safeguard user data from potential exploits.
eBooks & whitepapers
Download detailed mobile app protection checklists, reports, ebooks, and more.
View all