Jaroslav Novotný, Tomáš Soukal
April 4, 2023

Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft

Gone are the days of locally-held data and standalone applications. With the rise of smartphones and portable devices, we are constantly on the go and reliant on network calls for everything from social communication to live updates. As a result, protecting backend servers and API calls has become more crucial than ever.
Gone are the days of locally-held data and standalone applications. With the rise of smartphones and portable devices, we are constantly on the go and reliant on network calls for everything from social communication to live updates. As a result, protecting backend servers and API calls has become more crucial than ever.
You can read more about the concept of RASP (Runtime application self-protection)
here.

You may also like

OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart
OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart
a risk that lurks not in broken code or cracked crypto, but in how we collect, use, and protect user data.
Simple Root Detection: Implementation and verification
Simple Root Detection: Implementation and verification
Basics of root detection, how to implement and test.
Why Mobile Games are Prime Targets for Cyberattacks
Why Mobile Games are Prime Targets for Cyberattacks
And What Developers Must Do to Stay Ahead
Read More