Deep Dive into Reverse Engineering on Android
Sep 14, 2023

Deep Dive into Reverse Engineering on Android

Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.
Brute Forcing PINs with Frida: Mobile Penetration Testing
Sep 07, 2023

Brute Forcing PINs with Frida: Mobile Penetration Testing

Walk through a mobile penetration test on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
Aug 28, 2023

Taking Off with Golang: An Introduction to the Corellium API Bindings for Go

We simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
Aug 23, 2023

Building What's Next: The Future of R&D for Mobile, IoT, and Beyond

The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
Aug 22, 2023

Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development

IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization is the solution for next-gen R&D.
The Power of Virtualization in the Fight Against Mobile Based Malware Threats
Aug 14, 2023

The Power of Virtualization in the Fight Against Mobile Based Malware Threats

Unveiling the future of mobile security: Corellium CEO's insights on battling mobile device malware threats.
Finding Hooks in Android Applications: Tools for Security Research
Aug 11, 2023

Finding Hooks in Android Applications: Tools for Security Research

Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Aug 02, 2023

Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial

Forward-looking security researchers are using virtualization for iOS app testing, getting ahead of criminals and identifying vulnerabilities before they cause harm.
Boolean-Based iOS Jailbreak Detection Bypass with Frida
Jul 26, 2023

Boolean-Based iOS Jailbreak Detection Bypass with Frida

Walk through the process of setting up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass jailbreak detection.
Investigating iOS Phishing Using Virtualization Technology
Jun 27, 2023

Investigating iOS Phishing Using Virtualization Technology

By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
Major Cybersecurity Services Firm Works with Corellium
Jun 13, 2023

Major Cybersecurity Services Firm Works with Corellium

Big business and governments rely on this global cybersecurity services firm, and this firm relies on Corellium.
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Jun 09, 2023

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.