all InfoSec news
Black Hat 2023: Understanding Mobile Exploitation Beyond the App
Application and Cybersecurity Blog blog.securityinnovation.com
Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond
Dinesh Shetty, Director, Security Engineering, Security Innovation
Mobile applications are the obvious target for cyber attacks, but a secure application won't faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.
adversary android app application applications architecture arm attacks beyond black hat black hat 2023 cyber cyber attacks director engineering exploit exploitation innovation interface ios mobile mobile applications mobile security operations security security engineering security innovation target understanding world