Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
Aug 22, 2023

Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development

IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.
The Power of Virtualization in the Fight Against Mobile Based Malware Threats
Aug 14, 2023

The Power of Virtualization in the Fight Against Mobile Based Malware Threats

Unveiling the future of mobile security: Corellium CEO's insights on battling mobile device malware threats.
Finding Hooks in Android Applications: Tools for Security Research
Aug 11, 2023

Finding Hooks in Android Applications: Tools for Security Research

Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Aug 02, 2023

Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial

Testing third-party iOS apps helps you identify unknown vulnerabilities. Learn more about how Corellium can help revolutionize your AppSec testing.
Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium
Jul 26, 2023

Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium

See how to set up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass iOS jailbreak detection.
Investigating iOS Phishing Using Virtualization Technology
Jun 27, 2023

Investigating iOS Phishing Using Virtualization Technology

By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
Major Cybersecurity Services Firm Works with Corellium
Jun 13, 2023

Major Cybersecurity Services Firm Works with Corellium

Big business and governments rely on this global cybersecurity services firm, and this firm relies on Corellium.
Mastering Mobile Malware Detection: Essential Tools, Tactics, and Research Procedures
Jun 09, 2023

Mastering Mobile Malware Detection: Essential Tools, Tactics, and Research Procedures

Discover how Corellium’s advanced mobile malware detection tools enable threat researchers to streamline testing, analyze threats & strengthen mobile security.
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Jun 08, 2023

Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled

Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.
iOS Database Storage with Corellium
May 26, 2023

iOS Database Storage with Corellium

When conducting a mobile app security assessment, testing iOS database storage is critical. Learn how to test iOS app data storage in the DVIA-2 application.
Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
May 05, 2023

Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers

Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.
Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management
May 03, 2023

Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management

The need for quality iOS emulators continues to rise. Learn how to use Corellium with Cloudflare workers to make iOS virtual device management simple and scalable.