Technical
From Keep Rules to Guided Configuration
11 minute read | April 7, 2026Applying an optimizer like ProGuard or R8 can significantly improve the size or performance of your application. However, using such tools requires adding configuration in the form of keep rules to ensure your app stays functional after the...
Read more
6 min read
| March 31, 2026
Can Your App Survive Coruna and DarkSword iOS Exploits?
iOS
Technical
4 min read
| March 24, 2026
The Problem with One-Size-Fits-All Security and How to Fix It
Technical
Threatcast
Threat monitoring
Thought leadership
General
8 min read
| March 17, 2026
Building Resilient Mobile APIs in a Hostile Environment
Technical
App Security Testing
Protection
Security research
4 min read
| February 24, 2026
Automating Guardsquare Workflows with Bitrise
Technical
AppSweep
Dexguard
iXGuard
5 min read
| February 3, 2026
When Restricted Doesn’t Mean Secure: Google API Keys in Mobile Apps
Android
iOS
Technical
Protection
8 min read
| January 27, 2026
Bypassing the Key Attestation API with Remote Devices
Technical
4 min read
| January 13, 2026
Does Xcode 26 'Enhanced Security' Help Protect Mobile iOS Apps?
iOS
Technical
Protection
iXGuard
6 min read
| November 25, 2025
Know Your OWASP: Mobile Top 10 vs Mobile Application Security Project
Technical
Protection
Security testing
Security research
General
6 min read
| October 21, 2025
How Android Developers Can Mitigate Risks of Pixnapping-style Attacks
Android
Technical
News articles
Protection
Dexguard
From Keep Rules to Guided Configuration
https://www.guardsquare.com/blog/keep-rules-to-guided-configuration
Can Your App Survive Coruna and DarkSword iOS Exploits?
https://www.guardsquare.com/blog/coruna-ios-exploit
The Problem with One-Size-Fits-All Security and How to Fix It
https://www.guardsquare.com/blog/one-size-fits-all-security
Building Resilient Mobile APIs in a Hostile Environment
https://www.guardsquare.com/blog/building-mobile-api-security
Automating Guardsquare Workflows with Bitrise
https://www.guardsquare.com/blog/automate-workflows-with-bitrise
When Restricted Doesn’t Mean Secure: Google API Keys in Mobile Apps
https://www.guardsquare.com/blog/google-api-key-restirctions-mobile-app-security
Bypassing the Key Attestation API with Remote Devices
https://www.guardsquare.com/blog/bypassing-key-attestation-api
Does Xcode 26 'Enhanced Security' Help Protect Mobile iOS Apps?
https://www.guardsquare.com/blog/xcode-26-enhanced-security-for-ios-apps
Know Your OWASP: Mobile Top 10 vs Mobile Application Security Project
https://www.guardsquare.com/blog/revisiting-owasp-mobile-top-10
How Android Developers Can Mitigate Risks of Pixnapping-style Attacks
https://www.guardsquare.com/blog/mititgate-pixnapping-attack-risks


