Homepage
Open in app
Sign in
Get started
App security
Cloud security
Blockchain
Security testing
Join our newsletter
Other stories about security testing
Light & agile approach to threat modeling — Securing
Light & agile approach to threat modeling — Securing
A comprehensive introduction to Who-What-How Threat Modeling methodology.
Sebastian Obara
Sep 17
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
What can go wrong in LLM web applications from a security perspective? In this article, you will discover examples of threats and…
Dawid Nastaj
Jul 15
Manual vs. automated penetration testing — or maybe both?
Manual vs. automated penetration testing — or maybe both?
This article shows why manual and automated penetration tests are both important and not interchangeable.
Yelyzaveta Mariot
Oct 18, 2023
How to prepare an effective threat modeling session
How to prepare an effective threat modeling session
Every threat modeling session requires thorough preparation. This article will help you create an effective session step by step.
Sebastian Obara
May 19, 2023
Voice Biometrics — how easy is it to hack them with AI Deepfake?
Voice Biometrics — how easy is it to hack them with AI Deepfake?
Voice biometrics is becoming a widely used authentication method. It may be convenient but also vulnerable, especially in the age of AI…
Szymon Chadam
May 17, 2023
Why threat modeling is important — Securing
Why threat modeling is important — Securing
In our experience, we have discovered that, in many cases, threat modeling sessions are avoided due to the fear…
Sebastian Obara
Mar 8, 2023
How to stay secure for longer? Software development case.
How to stay secure for longer? Software development case.
Do you want your software to be secure in its DNA? This post is our overview of two possible ways to improve security awareness.
Mateusz Olejarka
Aug 23, 2021
Adding security to your SDLC process
Adding security to your SDLC process
What difference does threat modeling make? What are the benefits of having a Security Champion? Read more in this article.
Mateusz Olejarka
May 28, 2021
Threat Modeling — how to start doing it?
Threat Modeling — how to start doing it?
What steps to take for an effective analysis of the attack surface? See our approach to Threat modeling methodology.
Jakub Kaluzny
Apr 12, 2021
Why should you care about Content Security Policy?
Why should you care about Content Security Policy?
Content Security Policy (CSP) is like a bouncer in a club. It legitimizes every resource and lets in only the ones who have a valid ticket…
Michał Stanisław Ogorzałek
Apr 12, 2021
How to bring security to your company mindset?
How to bring security to your company mindset?
How does an internal event dedicated to security make a difference? Why keeping your security team in one place is a bad idea?
Mateusz Olejarka
Mar 16, 2021
Thinking what can go wrong? Introduction to Threat Modeling.
Thinking what can go wrong? Introduction to Threat Modeling.
Threat Modeling is getting traction in the IT Security world. By putting security issues at the very beginning of the development process…
Jakub Kaluzny
Feb 16, 2021
Local Privilege Escalation in macOS infrastructure
Local Privilege Escalation in macOS infrastructure
In this article we present you a common vulnerability pattern that we observe in Mac infrastructures.
Wojciech Reguła
Dec 9, 2020
Secure OAuth 2.0: How To Keep OAuth Secure?
Secure OAuth 2.0: How To Keep OAuth Secure?
Previous parts (part 1, part 2) of the series introduced the risks and described potential vulnerabilities in OAuth 2.0 implementation…
Damian Rusinek
Nov 2, 2020
Secure OAuth 2.0: What Could Possibly Go Wrong?
Secure OAuth 2.0: What Could Possibly Go Wrong?
The previous section, Starting with OAuth 2 — Security check, covered the main threats which are the users’ sensitive data leakage and the…
Damian Rusinek
Sep 4, 2020
About SecuRing
Latest Stories
Archive
About Medium
Terms
Privacy
Teams