Homepage
Open in app
Sign in
Get started
SecuRing your software
Ideas on improving software security
App security
Cloud security
Blockchain
Security testing
Join our newsletter
Follow
Baking Mojolicious Cookies revisited: a case study of solving security problems through security by…
Baking Mojolicious Cookies revisited: a case study of solving security problems through security by…
Known for its agility and simplicity, the Mojolicious framework is especially valued in niche industries with a Perl heritage. In our…
Jakub Kramarz
Oct 30
Security of External Dependencies in CI/CD Workflows
Security of External Dependencies in CI/CD Workflows
Use of external dependencies in build processes brings common security risks related to code integrity. But have you considered all of…
Jakub Kramarz
Oct 9
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
General guidance on Azure Function App authentication setup for different client types.
Natalia Trojanowska-Korepta
Sep 17
Light & agile approach to threat modeling — Securing
Light & agile approach to threat modeling — Securing
A comprehensive introduction to Who-What-How Threat Modeling methodology.
Sebastian Obara
Sep 17
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
New, old and new-old web vulnerabilities in the Era of LLMs — real-life examples
What can go wrong in LLM web applications from a security perspective? In this article, you will discover examples of threats and…
Dawid Nastaj
Jul 15
Azure Single Sign-On Case Study #2: Unmasking authentication in Function Apps
Azure Single Sign-On Case Study #2: Unmasking authentication in Function Apps
Explore the details of configuring Single Sign-On for Azure Function Apps and discover the potential security risks.
Natalia Trojanowska-Korepta
Jun 14
Azure Single Sign-On Case Study #1: Secure architecture for SPA & API
Azure Single Sign-On Case Study #1: Secure architecture for SPA & API
A case study of an insecure Single Sign-On architecture followed by a comprehensive guide on how to do it the right way.
Natalia Trojanowska-Korepta
Apr 9
Web Push Notifications and user-targeted attacks — our research
Web Push Notifications and user-targeted attacks — our research
Web push notifications are very common — but also not always secure. In this article, you will discover why and how push notifications…
Dawid Nastaj
Feb 14
The year in review: the most interesting Single Sign-On vulnerabilities of 2023
The year in review: the most interesting Single Sign-On vulnerabilities of 2023
Check out a summary of 2023’s most interesting Single Sign-On vulnerabilities, and make sure your company is not vulnerable to them.
Natalia Trojanowska-Korepta
Jan 31
Using Azure CLI and PowerShell to secure your Storage Accounts
Using Azure CLI and PowerShell to secure your Storage Accounts
Keeping your cloud infrastructure safe can be tricky. This article shows how to make your environment more secure using Azure CLI and…
Krzysiek Demczuk
Jan 31
Manual vs. automated penetration testing — or maybe both?
Manual vs. automated penetration testing — or maybe both?
This article shows why manual and automated penetration tests are both important and not interchangeable.
Yelyzaveta Mariot
Oct 18, 2023
How to prepare an effective threat modeling session
How to prepare an effective threat modeling session
Every threat modeling session requires thorough preparation. This article will help you create an effective session step by step.
Sebastian Obara
May 19, 2023
Voice Biometrics — how easy is it to hack them with AI Deepfake?
Voice Biometrics — how easy is it to hack them with AI Deepfake?
Voice biometrics is becoming a widely used authentication method. It may be convenient but also vulnerable, especially in the age of AI…
Szymon Chadam
May 17, 2023
Storing secrets in web applications using vaults
Storing secrets in web applications using vaults
There is no one-size-fits-all solution when it comes to storing secrets in web applications. Here, you will learn about the useful feat…
Aleksander Młodak
Apr 25, 2023
Cloud Shared Responsibility Model explained
Cloud Shared Responsibility Model explained
The cloud computing is the future, and many companies are moving their workloads to the cloud. However, there is a general misconception…
Łukasz Bobrek
Apr 14, 2023
Crypto Wallet Security — Video
Crypto Wallet Security — Video
In this video, you will learn what security features are important for mobile crypto wallets.
Dawid Pastuszak
Mar 8, 2023
Why threat modeling is important — Securing
Why threat modeling is important — Securing
In our experience, we have discovered that, in many cases, threat modeling sessions are avoided due to the fear…
Sebastian Obara
Mar 8, 2023
How passkeys will impact app security and set us free
How passkeys will impact app security and set us free
Find out more about the latest authentication trend and discover technical details behind passkeys.
Natalia Trojanowska-Korepta
Feb 2, 2023
Third-party iPhone keyboards vs your iOS application security
Third-party iPhone keyboards vs your iOS application security
The story about the customization of iPhone keyboards is a tightrope walk between comfort and security. Given this road full of obstacles…
Przemek Samsel
Oct 27, 2022
HTTP request smuggling attack. Is it a vulnerability still worth considering?
HTTP request smuggling attack. Is it a vulnerability still worth considering?
Smuggling through international borders is a massive-scale problem. History has shown people can smuggle everything, from drugs, money, and…
Przemek Samsel
Sep 25, 2022
7 key steps for secure Single Sign-On integration
7 key steps for secure Single Sign-On integration
A security guideline for implementing a Single Sign-On (SSO) integration into your web app.
Natalia Trojanowska-Korepta
Jul 15, 2022
Blockchain bridges security & common cross-chain vulnerabilities
Blockchain bridges security & common cross-chain vulnerabilities
What to consider when developing a secure cross-chain protocol? Let’s draw conclusions from some of the past cross-chain exploits.
Jakub Zmysłowski
Jul 12, 2022
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
Natalia Trojanowska-Korepta
Apr 27, 2022
Smart Contracts Audits — how to get the most out of your security report?
Smart Contracts Audits — how to get the most out of your security report?
You have received a security report and wonder what to do next? Here are proven ways to help you introduce a higher level of security.
Paweł Kuryłowicz
Mar 28, 2022
Storing secrets in Android applications
Storing secrets in Android applications
What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
Łukasz Bobrek
Mar 8, 2022
About SecuRing
Latest Stories
Archive
About Medium
Terms
Privacy
Teams