Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Aug 02, 2023

Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial

Forward-looking security researchers are using virtualization for iOS app testing, getting ahead of criminals and identifying vulnerabilities before they cause harm.
Boolean-Based iOS Jailbreak Detection Bypass with Frida
Jul 26, 2023

Boolean-Based iOS Jailbreak Detection Bypass with Frida

Walk through the process of setting up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass jailbreak detection.
Investigating iOS Phishing Using Virtualization Technology
Jun 27, 2023

Investigating iOS Phishing Using Virtualization Technology

By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
Major Cybersecurity Services Firm Works with Corellium
Jun 13, 2023

Major Cybersecurity Services Firm Works with Corellium

Big business and governments rely on this global cybersecurity services firm, and this firm relies on Corellium.
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Jun 09, 2023

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Jun 08, 2023

Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled

Learn about the tools, tactics, and procedures employed in mobile app reverse engineering, including an overview of the process and responsible practices.
iOS Database Storage with Corellium
May 26, 2023

iOS Database Storage with Corellium

When conducting a mobile app security assessment, it’s critical to test iOS database storage. See how to test iOS app data storage in the DVIA-2 application.
Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
May 05, 2023

Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers

Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.
Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management
May 03, 2023

Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management

The need for quality iOS emulators continues to rise. Learn how to use Corellium with Cloudflare workers to make iOS virtual device management simple and scalable.
3 Mobile App Security Testing Challenges and How to Overcome Them
Apr 28, 2023

3 Mobile App Security Testing Challenges and How to Overcome Them

Mobile app security testing is full of tedious tasks, but it’s vital to find vulnerabilities before bad actors do. Read about challenges and how to overcome them.
The Calls Are Coming from Inside the House
Apr 14, 2023

The Calls Are Coming from Inside the House

Learn how to set up SSH reverse tunneling in the Corellium app to help you with investigating phishing attacks on iOS. Code and rationale is provided.
Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing
Apr 04, 2023

Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing

Physical devices are tedious to manage and device emulation is insufficient. Learn a better way to conduct mobile app security testing with Arm virtualization.