Threatcast
When Restricted Doesn’t Mean Secure: Google API Keys in Mobile Apps
10 minute read | February 3, 2026Whether you are building a food delivery service using the Google Maps API, making your app ready for the AI age with the Gemini API, or taking advantage of the vast analytics and reporting capabilities provided by Firebase – third-party cloud APIs...
Read more
6 min read
| September 9, 2025
Protect Against Evolving Malware Attacks with Threat Monitoring
Android
Protection
Dexguard
Threatcast
Threat monitoring
3 min read
| August 26, 2025
Understanding Anti-Tamper Security in Mobile Apps
Programming Languages
Dexguard
iXGuard
Threatcast
Threat monitoring
9 min read
| August 12, 2025
Protect and Safeguard API Keys from Leakage and Misuse
Protection
Dexguard
iXGuard
Threatcast
Threat monitoring
App attestation
9 min read
| July 1, 2025
Remove the Constraints of iOS App Attest and DeviceCheck
Dexguard
iXGuard
Threatcast
Threat monitoring
Product launch
6 min read
| June 10, 2025
Drawbacks of the Google Play Integrity API for Mobile App Attestation
Dexguard
iXGuard
Threatcast
Threat monitoring
Product launch
Thought leadership
App attestation
4 min read
| May 6, 2025
Raise the Bar on Mobile App Security with App Attestation
Dexguard
iXGuard
Threatcast
Threat monitoring
Product launch
App attestation
3 min read
| September 3, 2024
How to Improve Your Anti-Fraud Strategy with Runtime Threat Insights
Financial services
Dexguard
iXGuard
Threatcast
Threat monitoring
4 min read
| July 16, 2024
Enabling Safe IoT Devices with Mobile App Security
AppSweep
Security testing
Compliance
Threatcast
Threat monitoring
5 min read
| May 14, 2024
10 Man-in-the-Middle Attack Types
Protection
Dexguard
iXGuard
Threatcast
Threat monitoring
How Server-Side App Attestation Protects APIs From Bot Attacks
https://www.guardsquare.com/blog/protect-apis-with-app-attestation
Protect Against Evolving Malware Attacks with Threat Monitoring
https://www.guardsquare.com/blog/fight-malware-attacks-with-threat-monitoring
Understanding Anti-Tamper Security in Mobile Apps
https://www.guardsquare.com/blog/anti-tamper-security-in-mobile-apps-guardsquare
Protect and Safeguard API Keys from Leakage and Misuse
https://www.guardsquare.com/blog/protect-api-keys-from-leaks
Remove the Constraints of iOS App Attest and DeviceCheck
https://www.guardsquare.com/blog/remove-constraints-of-ios-app-attest
Drawbacks of the Google Play Integrity API for Mobile App Attestation
https://www.guardsquare.com/blog/google-play-integrity-api-app-attestation
Raise the Bar on Mobile App Security with App Attestation
https://www.guardsquare.com/blog/app-attestation-mobile-app-security
How to Improve Your Anti-Fraud Strategy with Runtime Threat Insights
https://www.guardsquare.com/blog/improve-anti-fraud-strategy-with-runtime-data
Enabling Safe IoT Devices with Mobile App Security
https://www.guardsquare.com/blog/enabling-safe-iot-devices
10 Man-in-the-Middle Attack Types
https://www.guardsquare.com/blog/how-to-avoid-mitm-attacks
General Terms | Privacy Policy | Cookie Policy | Security
Tervuursevest 362 bus 1, 3000 Leuven, Belgium |
VAT: BE0550675829 |
© 2016-2026 Guardsquare nv. All rights reserved.


