Homepage
Open in app
Sign in
Get started
App security
Cloud security
Blockchain
Security testing
Join our newsletter
Web & Mobile Application Security
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
General guidance on Azure Function App authentication setup for different client types.
Natalia Trojanowska-Korepta
Sep 17
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
What can go wrong in LLM web applications from a security perspective? In this article, you will discover examples of threats and…
Dawid Nastaj
Jul 15
Azure Single Sign-On Case Study #2: Unmasking authentication in Function Apps
Azure Single Sign-On Case Study #2: Unmasking authentication in Function Apps
Explore the details of configuring Single Sign-On for Azure Function Apps and discover the potential security risks.
Natalia Trojanowska-Korepta
Jun 14
Azure Single Sign-On Case Study #1: Secure architecture for SPA & API
Azure Single Sign-On Case Study #1: Secure architecture for SPA & API
A case study of an insecure Single Sign-On architecture followed by a comprehensive guide on how to do it the right way.
Natalia Trojanowska-Korepta
Apr 9
Web Push Notifications and user-targeted attacks — our research
Web Push Notifications and user-targeted attacks — our research
Web push notifications are very common — but also not always secure. In this article, you will discover why and how push notifications…
Dawid Nastaj
Feb 14
The year in review: the most interesting Single Sign-On vulnerabilities of 2023
The year in review: the most interesting Single Sign-On vulnerabilities of 2023
Check out a summary of 2023’s most interesting Single Sign-On vulnerabilities, and make sure your company is not vulnerable to them.
Natalia Trojanowska-Korepta
Jan 31
Manual vs. automated penetration testing — or maybe both?
Manual vs. automated penetration testing — or maybe both?
This article shows why manual and automated penetration tests are both important and not interchangeable.
Yelyzaveta Mariot
Oct 18, 2023
Storing secrets in web applications using vaults
Storing secrets in web applications using vaults
There is no one-size-fits-all solution when it comes to storing secrets in web applications. Here, you will learn about the useful feat…
Aleksander Młodak
Apr 25, 2023
Crypto Wallet Security — Video
Crypto Wallet Security — Video
In this video, you will learn what security features are important for mobile crypto wallets.
Dawid Pastuszak
Mar 8, 2023
How passkeys will impact app security and set us free
How passkeys will impact app security and set us free
Find out more about the latest authentication trend and discover technical details behind passkeys.
Natalia Trojanowska-Korepta
Feb 2, 2023
Third-party iPhone keyboards vs your iOS application security
Third-party iPhone keyboards vs your iOS application security
The story about the customization of iPhone keyboards is a tightrope walk between comfort and security. Given this road full of obstacles…
Przemek Samsel
Oct 27, 2022
HTTP request smuggling attack. Is it a vulnerability still worth considering?
HTTP request smuggling attack. Is it a vulnerability still worth considering?
Smuggling through international borders is a massive-scale problem. History has shown people can smuggle everything, from drugs, money, and…
Przemek Samsel
Sep 25, 2022
7 key steps for secure Single Sign-On integration
7 key steps for secure Single Sign-On integration
A security guideline for implementing a Single Sign-On (SSO) integration into your web app.
Natalia Trojanowska-Korepta
Jul 15, 2022
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
Natalia Trojanowska-Korepta
Apr 27, 2022
Storing secrets in Android applications
Storing secrets in Android applications
What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
Łukasz Bobrek
Mar 8, 2022
About SecuRing
Latest Stories
Archive
About Medium
Terms
Privacy
Teams