Homepage
Open in app
Sign in
Get started
SecuRing your software
Ideas on how to improve software security
App security
Cloud security
Blockchain
Security testing
Join our newsletter
Follow
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC
Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
Natalia Trojanowska
Apr 27
Smart Contracts Audits — how to get the most out of your security report?
Smart Contracts Audits — how to get the most out of your security report?
You have received a security report and wonder what to do next? Here are proven ways to help you introduce a higher level of security.
Paweł Kuryłowicz
Mar 28
Storing secrets in Android applications
Storing secrets in Android applications
What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
Łukasz Bobrek
Mar 8
Front-running attack in DeFi applications — how to deal with it?
Front-running attack in DeFi applications — how to deal with it?
What is front-running and what actions can you take to minimize the negative effects of this attack? Here’s our recommendations to make…
Jakub Zmysłowski
Mar 7
Setting up your AWS Monitoring — Security tips
Setting up your AWS Monitoring — Security tips
This article contains good practices of AWS Monitoring and Alerting configuration. We also showed a few real-world evasion techniques.
Paweł Kusiński
Mar 7
Prevent Reverse Engineering (RE) of your Android application
Prevent Reverse Engineering (RE) of your Android application
From this article, you’ll learn how to implement protection measures against reverse engineering in your android application.
Łukasz Bobrek
Mar 7
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing
We present potential threats of performing local authorization on iOS. You will learn how to protect your resources.
Wojciech Reguła
Jan 12
The future security of your smart contracts — upcoming changes in SCSVS
The future security of your smart contracts — upcoming changes in SCSVS
This article presents our vision for standard updates in SCSVS.
Paweł Kuryłowicz
Dec 14, 2021
WebView security issues in Android applications
WebView security issues in Android applications
WebView is in common use in Android applications. Here you will find tips on how to use WebView with security in mind.
Łukasz Bobrek
Nov 8, 2021
SAML — what can go wrong? Security check
SAML — what can go wrong? Security check
What you should consider when trying to securely integrate with SAML Identity Provider.
Natalia Trojanowska
Oct 27, 2021
How to force Android devices to communicate securely?
How to force Android devices to communicate securely?
Secure network communication is one of the most critical aspects of mobile application development. In this article, you will find tips on…
Łukasz Bobrek
Oct 20, 2021
Secure implementation of WebView in iOS applications — Securing
Secure implementation of WebView in iOS applications — Securing
This post discusses how to ensure secure WebViews and how to keep the attack surface restricted.
Wojciech Reguła
Oct 7, 2021
Reentrancy attack in smart contracts - is it still a problem?’
Reentrancy attack in smart contracts - is it still a problem?’
Reentrancy is as old as Solidity itself, and even older because it’s not the only programming language it appears in. It got a lot of…
Paweł Kuryłowicz
Sep 28, 2021
Security Features in Financial Applications — our recommendations
Security Features in Financial Applications — our recommendations
This article is an introduction to our open source project: Financial Application Features Security Guide (FAFSG).
Łukasz Bobrek
Sep 2, 2021
How to stay secure for longer? Software development case.
How to stay secure for longer? Software development case.
Do you want your software to be secure in its DNA? This post is our overview of two possible ways to improve security awareness.
Mateusz Olejarka
Aug 23, 2021
Top 7 AWS security vulnerabilities based on real-world tests
Top 7 AWS security vulnerabilities based on real-world tests
In our security tests and reviews of the AWS infrastructure , we often come across repeated oversights. Here are the most common ones.
Paweł Kusiński
Aug 19, 2021
Before you implement Face Recognition to your app — AI hack study
Before you implement Face Recognition to your app — AI hack study
In this article, we fooled popular Face Recognition APIs such as Azure Cognitive Services, Amazon Rekognition, and Face++.
Sebastian Drygiel
Aug 5, 2021
Why is it good to look back at your older iOS application builds?
Why is it good to look back at your older iOS application builds?
This article shows why you should always change the secrets in case they were leaked in previous versions of the application.
Dawid Pastuszak
Jun 25, 2021
Key aspects of secure networking on iOS — Securing
Key aspects of secure networking on iOS — Securing
To this day, we encounter programs that use unencrypted HTTP on occasion. This article is all about secure networking on iOS.
Wojciech Reguła
Jun 8, 2021
The twisted world of Android Instance Identifiers and how to deal with it
The twisted world of Android Instance Identifiers and how to deal with it
The purpose of this article is to make you aware of the risks associated with improper usage of instance identifiers.
Łukasz Bobrek
May 28, 2021
Adding security to your SDLC process
Adding security to your SDLC process
What difference does threat modeling make? What are the benefits of having a Security Champion? Read more in this article.
Mateusz Olejarka
May 28, 2021
What can you find in 57K AWS S3 buckets? 2021 update
What can you find in 57K AWS S3 buckets? 2021 update
Cloud infrastructure is becoming a standard, but correct access settings still do not seem so obvious. See how we managed to make use of…
Paweł Kusiński
Apr 28, 2021
5 security tips for your macOS environment — Securing
5 security tips for your macOS environment — Securing
It is not worth being indulgent with other operating systems. See howyou can align the level of security in your organization.
Wojciech Reguła
Apr 28, 2021
The secure way to store secrets on iOS devices — Securing
The secure way to store secrets on iOS devices — Securing
In this article, we will go through available methods and show you the recommended way to do this.
Wojciech Reguła
Apr 14, 2021
Threat Modeling — how to start doing it?
Threat Modeling — how to start doing it?
What steps to take for an effective analysis of the attack surface? See our approach to Threat modeling methodology.
Jakub Kaluzny
Apr 12, 2021
About SecuRing
Latest Stories
Archive
About Medium
Terms
Privacy