Homepage
Open in app
Sign inGet started

SecuRing your software

Ideas on how to improve software security

  • App security
  • Cloud security
  • Blockchain
  • Security testing
  • Join our newsletter
  • Crypto Wallet Security — Video

    Crypto Wallet Security — Video

    In this video, you will learn what security features are important for mobile crypto wallets.
    Go to the profile of Dawid Pastuszak
    Dawid Pastuszak
    Mar 8
    Why threat modeling is important — Securing

    Why threat modeling is important — Securing

    In our experience, we have discovered that, in many cases, threat modeling sessions are avoided due to the fear…
    Go to the profile of Sebastian Obara
    Sebastian Obara
    Mar 8
    How passkeys will impact app security and set us free

    How passkeys will impact app security and set us free

    Find out more about the latest authentication trend and discover technical details behind passkeys.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Feb 2
    Third-party iPhone keyboards vs your iOS application security

    Third-party iPhone keyboards vs your iOS application security

    The story about the customization of iPhone keyboards is a tightrope walk between comfort and security. Given this road full of obstacles…
    Go to the profile of Przemek Samsel
    Przemek Samsel
    Oct 27, 2022
    HTTP request smuggling attack. Is it a vulnerability still worth considering?

    HTTP request smuggling attack. Is it a vulnerability still worth considering?

    Smuggling through international borders is a massive-scale problem. History has shown people can smuggle everything, from drugs, money, and…
    Go to the profile of Przemek Samsel
    Przemek Samsel
    Sep 25, 2022
    7 key steps for secure Single Sign-On integration

    7 key steps for secure Single Sign-On integration

    A security guideline for implementing a Single Sign-On (SSO) integration into your web app.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Jul 15, 2022
    Blockchain bridges security & common cross-chain vulnerabilities

    Blockchain bridges security & common cross-chain vulnerabilities

    What to consider when developing a secure cross-chain protocol? Let’s draw conclusions from some of the past cross-chain exploits.
    Go to the profile of Jakub Zmysłowski
    Jakub Zmysłowski
    Jul 12, 2022
    Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC

    Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC

    Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Apr 27, 2022
    Smart Contracts Audits — how to get the most out of your security report?

    Smart Contracts Audits — how to get the most out of your security report?

    You have received a security report and wonder what to do next? Here are proven ways to help you introduce a higher level of security.
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Mar 28, 2022
    Storing secrets in Android applications

    Storing secrets in Android applications

    What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Mar 8, 2022
    Front-running attack in DeFi applications — how to deal with it?

    Front-running attack in DeFi applications — how to deal with it?

    What is front-running and what actions can you take to minimize the negative effects of this attack? Here’s our recommendations to make…
    Go to the profile of Jakub Zmysłowski
    Jakub Zmysłowski
    Mar 7, 2022
    Setting up your AWS Monitoring — Security tips

    Setting up your AWS Monitoring — Security tips

    This article contains good practices of AWS Monitoring and Alerting configuration. We also showed a few real-world evasion techniques.
    Go to the profile of Paweł Kusiński
    Paweł Kusiński
    Mar 7, 2022
    Prevent Reverse Engineering (RE) of your Android application

    Prevent Reverse Engineering (RE) of your Android application

    From this article, you’ll learn how to implement protection measures against reverse engineering in your android application.
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Mar 7, 2022
    Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

    Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

    We present potential threats of performing local authorization on iOS. You will learn how to protect your resources.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Jan 12, 2022
    The future security of your smart contracts — upcoming changes in SCSVS

    The future security of your smart contracts — upcoming changes in SCSVS

    This article presents our vision for standard updates in SCSVS.
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Dec 14, 2021
    WebView security issues in Android applications

    WebView security issues in Android applications

    WebView is in common use in Android applications. Here you will find tips on how to use WebView with security in mind.
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Nov 8, 2021
    SAML — what can go wrong? Security check

    SAML — what can go wrong? Security check

    What you should consider when trying to securely integrate with SAML Identity Provider.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Oct 27, 2021
    How to force Android devices to communicate securely?

    How to force Android devices to communicate securely?

    Secure network communication is one of the most critical aspects of mobile application development. In this article, you will find tips on…
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Oct 20, 2021
    Secure implementation of WebView in iOS applications — Securing

    Secure implementation of WebView in iOS applications — Securing

    This post discusses how to ensure secure WebViews and how to keep the attack surface restricted.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Oct 7, 2021
    Reentrancy attack in smart contracts - is it still a problem?’

    Reentrancy attack in smart contracts - is it still a problem?’

    Reentrancy is as old as Solidity itself, and even older because it’s not the only programming language it appears in. It got a lot of…
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Sep 28, 2021
    Security Features in Financial Applications — our recommendations

    Security Features in Financial Applications — our recommendations

    This article is an introduction to our open source project: Financial Application Features Security Guide (FAFSG).
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Sep 2, 2021
    How to stay secure for longer? Software development case.

    How to stay secure for longer? Software development case.

    Do you want your software to be secure in its DNA? This post is our overview of two possible ways to improve security awareness.
    Go to the profile of Mateusz Olejarka
    Mateusz Olejarka
    Aug 23, 2021
    Top 7 AWS security vulnerabilities based on real-world tests

    Top 7 AWS security vulnerabilities based on real-world tests

    In our security tests and reviews of the AWS infrastructure , we often come across repeated oversights. Here are the most common ones.
    Go to the profile of Paweł Kusiński
    Paweł Kusiński
    Aug 19, 2021
    Before you implement Face Recognition to your app — AI hack study

    Before you implement Face Recognition to your app — AI hack study

    In this article, we fooled popular Face Recognition APIs such as Azure Cognitive Services, Amazon Rekognition, and Face++.
    Go to the profile of Sebastian Drygiel
    Sebastian Drygiel
    Aug 5, 2021
    Why is it good to look back at your older iOS application builds?

    Why is it good to look back at your older iOS application builds?

    This article shows why you should always change the secrets in case they were leaked in previous versions of the application.
    Go to the profile of Dawid Pastuszak
    Dawid Pastuszak
    Jun 25, 2021
    About SecuRingLatest StoriesArchiveAbout MediumTermsPrivacy