Tag

Third-Party

Hardcoded secrets are easy to find and might open a gate to sensitive data or privileged access. This makes them a great target for Bug Bounty hunters and Attackers.

Security

[Online Event] Security of 3rd party dependencies in Mobile Applications

Mobile applications assessments, automation of 3rd party dependency review

Fri 12 June 2020

Engineering

Android external libs!

For an Android developer, it has become standard practice to use external libraries to easily ext...

Tue 01 November 2016