Blog
From Keep Rules to Guided Configuration
11 minute read | April 7, 2026Applying an optimizer like ProGuard or R8 can significantly improve the size or performance of your application. However, using such tools requires adding configuration in the form of keep rules to ensure your app stays functional after the...
Read more
6 min read
| March 31, 2026
Can Your App Survive Coruna and DarkSword iOS Exploits?
iOS
Technical
4 min read
| March 24, 2026
The Problem with One-Size-Fits-All Security and How to Fix It
Technical
Threatcast
Threat monitoring
Thought leadership
General
8 min read
| March 17, 2026
Building Resilient Mobile APIs in a Hostile Environment
Technical
App Security Testing
Protection
Security research
4 min read
| March 10, 2026
Real-Time Threat Monitoring in Modern Mobile App Protection
Android
iOS
Protection
Threatcast
Threat monitoring
6 min read
| March 3, 2026
Mobile Healthcare App Integrity Is Now a Patient Safety Issue
Protection
Healthcare
Security testing
Compliance
Thought leadership
4 min read
| February 24, 2026
Automating Guardsquare Workflows with Bitrise
Technical
AppSweep
Dexguard
iXGuard
4 min read
| February 17, 2026
Breaking Down Recent Publicly Disclosed Mobile App Vulnerabilities
Android
AppSweep
Security testing
Dexguard
Threat monitoring
3 min read
| February 10, 2026
The Hidden Risk in Your iOS App: What Attackers Already Know
iOS
iXGuard
Security research
Thought leadership
5 min read
| February 3, 2026
When Restricted Doesn’t Mean Secure: Google API Keys in Mobile Apps
Android
iOS
Technical
Protection
From Keep Rules to Guided Configuration
https://www.guardsquare.com/blog/keep-rules-to-guided-configuration
Can Your App Survive Coruna and DarkSword iOS Exploits?
https://www.guardsquare.com/blog/coruna-ios-exploit
The Problem with One-Size-Fits-All Security and How to Fix It
https://www.guardsquare.com/blog/one-size-fits-all-security
Building Resilient Mobile APIs in a Hostile Environment
https://www.guardsquare.com/blog/building-mobile-api-security
Real-Time Threat Monitoring in Modern Mobile App Protection
https://www.guardsquare.com/blog/real-time-threat-monitoring
Mobile Healthcare App Integrity Is Now a Patient Safety Issue
https://www.guardsquare.com/blog/mobile-healthcare-app-integrity
Automating Guardsquare Workflows with Bitrise
https://www.guardsquare.com/blog/automate-workflows-with-bitrise
Breaking Down Recent Publicly Disclosed Mobile App Vulnerabilities
https://www.guardsquare.com/blog/breaking-down-mobile-app-vulnerabilities
The Hidden Risk in Your iOS App: What Attackers Already Know
https://www.guardsquare.com/blog/hidden-risks-in-ios-apps
When Restricted Doesn’t Mean Secure: Google API Keys in Mobile Apps
https://www.guardsquare.com/blog/google-api-key-restirctions-mobile-app-security


