Hacking and protection of Mobile Apps and backend APIs

Threat Modeling exercise

Your details

Subscribing to

Confirm sign-up

What you will learn?

The goal of this talk is to explore a few ways in which mobile apps & APIs are hacked and what you need to do to protect them. We will explore large-scale attacks, reverse engineering (find API key) backend APIs like botnets, fake registrations, and token hijacking. 

You should attend this talk if you want to know how mobile apps & APIs are being hacked and what you need to do to protect them. We will explore large-scale attacks targeting , reverse engineering (find API key) backend APIs like botnets, fake registrations, and token hijacking. Whether you're a developer, security professional, or anyone invested in securing mobile applications, this talk equips you with practical insights and proactive measures to safeguard against evolving cyber threats. The talk is aligned with current OWASP MAS practices, focusing on architecture, resiliency, network, and storage areas. Join to stay ahead in protecting your digital assets.
Presentation by
Tomáš Soukal

​​​​​​​You can view this webinar from your computer, tablet or mobile phone.

Share this webinar