loading...
Paulo Renato profile picture

Paulo Renato

I am a Developer Advocate for Security in Mobile Apps and APIs at approov.io. Another passion is the Elixir programming language that was designed to be concurrent, distributed and fault tolerant.

Education

Self teached Developer

Work

Developer Advocate at CriticalBlue

Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

Reactions 3
10 min read
Using a Reverse Proxy to Protect Third Party APIs

Using a Reverse Proxy to Protect Third Party APIs

Reactions 10
7 min read
How to Protect Against Certificate Pinning Bypassing

How to Protect Against Certificate Pinning Bypassing

Reactions 8
13 min read
Bypassing Certificate Pinning

Bypassing Certificate Pinning

Reactions 10
6 min read
Securing HTTPS with Certificate Pinning on Android

Securing HTTPS with Certificate Pinning on Android

Reactions 14
13 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

Reactions 49 Comments 2
9 min read
Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Reactions 6
3 min read
Bypassing GitHub's OAuth flow

Bypassing GitHub's OAuth flow

Reactions 13
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

Reactions 13
2 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Reactions 7 Comments 1
1 min read
Millions of Phones Leaking Information Via Tor

Millions of Phones Leaking Information Via Tor

Reactions 8
2 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Reactions 6
2 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

Reactions 6 Comments 5
2 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

Reactions 6 Comments 2
2 min read
The iOS Checkm8 jailbreak is hugely significant, but not for you

The iOS Checkm8 jailbreak is hugely significant, but not for you

Reactions 5
1 min read
Android Devices Being Shipped with TCP Port 5555 Enabled

Android Devices Being Shipped with TCP Port 5555 Enabled

Reactions 11 Comments 3
2 min read
Browser Based Cyber Threats

Browser Based Cyber Threats

Reactions 13 Comments 3
2 min read
Containers Under Attack

Containers Under Attack

Reactions 20 Comments 9
1 min read
Do you know that DNS queries do not protect your privacy?

Do you know that DNS queries do not protect your privacy?

Reactions 13 Comments 1
1 min read
Raising security awareness with a CTF competition... did you already participate in one, how it was?

Raising security awareness with a CTF competition... did you already participate in one, how it was?

Reactions 7
1 min read
Revenge Hacking Is Hitting the Big Time

Revenge Hacking Is Hitting the Big Time

Reactions 29 Comments 4
1 min read
loading...