Yurii Denchyk

Yurii Denchyk @yurii_denchyk_bb561af8d2d

About: App Security

Joined:
Jan 23, 2025

Yurii Denchyk
articles - 32 total

How to Detect Hooking (Frida) using Swift

On iOS, attackers equipped with Frida can hijack your app. DIY detection is fragile - serious apps...

Learn More 0 0Oct 10

How to Detect Hooking (Frida) using Kotlin

How to Detect Hooking (Frida) using Kotlin | by Talsec | Sep,...

Learn More 0 0Sep 26

How Secure Are Flutter Apps?

How Secure Are Flutter Apps? Security, Compliance, and...

Learn More 0 0Sep 25

How to prevent Time Spoofing with AppiCrypt.

Relying on device system time exposes app to - free trial abuse, license fraud, unfair gaming...

Learn More 0 0Sep 18

How to Detect Jailbreak using Swift.

How to Detect Jailbreak using Swift | by Talsec | Sep, 2025 |...

Learn More 0 0Sep 9

How to Detect Root using Kotlin

How to Detect Root using Kotlin. Need to secure your app...

Learn More 0 0Sep 8

Hardware-Backed Keystore

Ever wonder what really protects your phone's most sensitive data? It's not just software. Meet the...

Learn More 0 0Aug 29

A Guide to Countering GameGuardian with Talsec

GameGuardian's method of attack is deceptively simple yet profoundly damaging: it latches onto a live...

Learn More 0 0Aug 8

We tracked the App Integrity threat rate over 90 days, and the data is clear: the threat is constant and dynamic.

Talsec app integrity detection verifies your mobile App is the original, untampered version you...

Learn More 0 0Aug 7

Introducing Multi-Instancing Detection for freeRASP

another demanded feature for your mobile app security. docs.talsec.app

Learn More 0 0Aug 7

Introducing the Talsec Portal: A New Way to Monitor Your Mobile App Security — Try It Now!

docs.talsec.app

Learn More 0 0Jul 30

How to Achieve Root-Like Control Without Rooting: Shizuku's Perils & Talsec's Root Detection

How to Achieve Root-Like Control Without Rooting: Shizuku’s...

Learn More 0 0Jul 17

How to Achieve Root-Like Control Without Rooting: Shizuku's Perils & Talsec's Root Detection

How to Achieve Root-Like Control Without Rooting: Shizuku’s...

Learn More 0 0Jul 17

freeRASP for Unity

Good news for Unity Developers - now you can secure your game with freeRASP SDK from Talsec. Check...

Learn More 0 0Jul 10

ApkSignatureKiller: How It Works

ApkSignatureKiller: How It Works and How Talsec Protects Your...

Learn More 0 0Jun 26

Podcast: iOS Keychain vs Android Keystore

A post by Yurii Denchyk

Learn More 0 0Jun 20

Podcast: iOS Keychain vs Android Keystore

A post by Yurii Denchyk

Learn More 0 0Jun 20

AI-Powered Device Risk Summary | Android & iOS

watch on YouTube Article on Medium

Learn More 0 0Jun 19

OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter & Dart

OWASP Top 10 For Flutter — M6: Inadequate Privacy Controls in Flutter & Dart - this one offers...

Learn More 1 0May 21

How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps

A post by Yurii Denchyk

Learn More 0 0May 14

Simple Root Detection: Implementation and verification

Read on Medium

Learn More 1 0May 8

Simple Root Detection: Implementation and verification

Read on Medium

Learn More 0 0May 8

OWASP Top 10 For Flutter — M5: Insecure Communication for Flutter and Dart

In this fifth instalment of our OWASP Top 10 series for Flutter developers, we shift focus to M5:...

Learn More 0 0May 2

OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter

Welcome back to our deep dive into the OWASP Mobile Top 10, explicitly tailored for Flutter...

Learn More 0 0Apr 25

Transparent crash-tracking for production with PLCrashReporter

experts break down transparent crash-tracking solutions for production with PLCrashReporter, its...

Learn More 0 0Mar 27

M3: Insecure Authentication and Authorization in Flutter

is a part 3 in series of articles on OWASP Top 10 by expert Majid Hajian https://t.co/QCR9d8Lbgv

Learn More 1 0Mar 26

OWASP Top 10 For Flutter — M2: Inadequate Supply Chain Security in Flutter

Part two in series of articles covering OWASP Top 10 For...

Learn More 1 0Mar 18

OWASP Top 10 For Flutter - M1: Mastering Credential Security

New series of articles covering OWASP Top 10 For Flutter by Majid Hajian Azure & AI advocate...

Learn More 1 0Mar 12

Hook, Hack, Defend: Frida’s Impact on Mobile Security & How to Fight Back

Talsec's engineer Akshit Singh explores how Frida works, the risks it poses to mobile apps, and why...

Learn More 0 0Mar 6

Emulators in Gaming: Threats and Detections

by Jaroslav Novotný, Senior Flutter Developer Android Emulators. What is an emulator, how can it...

Learn More 2 0Feb 28