Homepage
Open in app
Sign inGet started

SecuRing your software

Ideas on how to improve software security

  • App security
  • Cloud security
  • Blockchain
  • Security testing
  • Join our newsletter
  • Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC

    Which Single Sign-On (SSO) is for you? SAML vs OAuth vs OIDC

    Comprehensive overview of the most common questions about Single Sign-On (SSO). Choose the right standard for your applications.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Apr 27
    Smart Contracts Audits — how to get the most out of your security report?

    Smart Contracts Audits — how to get the most out of your security report?

    You have received a security report and wonder what to do next? Here are proven ways to help you introduce a higher level of security.
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Mar 28
    Storing secrets in Android applications

    Storing secrets in Android applications

    What is the best place to keep your secrets secure on Android devices? This article shows available methods and our security…
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Mar 8
    Front-running attack in DeFi applications — how to deal with it?

    Front-running attack in DeFi applications — how to deal with it?

    What is front-running and what actions can you take to minimize the negative effects of this attack? Here’s our recommendations to make…
    Go to the profile of Jakub Zmysłowski
    Jakub Zmysłowski
    Mar 7
    Setting up your AWS Monitoring — Security tips

    Setting up your AWS Monitoring — Security tips

    This article contains good practices of AWS Monitoring and Alerting configuration. We also showed a few real-world evasion techniques.
    Go to the profile of Paweł Kusiński
    Paweł Kusiński
    Mar 7
    Prevent Reverse Engineering (RE) of your Android application

    Prevent Reverse Engineering (RE) of your Android application

    From this article, you’ll learn how to implement protection measures against reverse engineering in your android application.
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Mar 7
    Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

    Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing

    We present potential threats of performing local authorization on iOS. You will learn how to protect your resources.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Jan 12
    The future security of your smart contracts — upcoming changes in SCSVS

    The future security of your smart contracts — upcoming changes in SCSVS

    This article presents our vision for standard updates in SCSVS.
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Dec 14, 2021
    WebView security issues in Android applications

    WebView security issues in Android applications

    WebView is in common use in Android applications. Here you will find tips on how to use WebView with security in mind.
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Nov 8, 2021
    SAML — what can go wrong? Security check

    SAML — what can go wrong? Security check

    What you should consider when trying to securely integrate with SAML Identity Provider.
    Go to the profile of Natalia Trojanowska
    Natalia Trojanowska
    Oct 27, 2021
    How to force Android devices to communicate securely?

    How to force Android devices to communicate securely?

    Secure network communication is one of the most critical aspects of mobile application development. In this article, you will find tips on…
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Oct 20, 2021
    Secure implementation of WebView in iOS applications — Securing

    Secure implementation of WebView in iOS applications — Securing

    This post discusses how to ensure secure WebViews and how to keep the attack surface restricted.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Oct 7, 2021
    Reentrancy attack in smart contracts - is it still a problem?’

    Reentrancy attack in smart contracts - is it still a problem?’

    Reentrancy is as old as Solidity itself, and even older because it’s not the only programming language it appears in. It got a lot of…
    Go to the profile of Paweł Kuryłowicz
    Paweł Kuryłowicz
    Sep 28, 2021
    Security Features in Financial Applications — our recommendations

    Security Features in Financial Applications — our recommendations

    This article is an introduction to our open source project: Financial Application Features Security Guide (FAFSG).
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    Sep 2, 2021
    How to stay secure for longer? Software development case.

    How to stay secure for longer? Software development case.

    Do you want your software to be secure in its DNA? This post is our overview of two possible ways to improve security awareness.
    Go to the profile of Mateusz Olejarka
    Mateusz Olejarka
    Aug 23, 2021
    Top 7 AWS security vulnerabilities based on real-world tests

    Top 7 AWS security vulnerabilities based on real-world tests

    In our security tests and reviews of the AWS infrastructure , we often come across repeated oversights. Here are the most common ones.
    Go to the profile of Paweł Kusiński
    Paweł Kusiński
    Aug 19, 2021
    Before you implement Face Recognition to your app — AI hack study

    Before you implement Face Recognition to your app — AI hack study

    In this article, we fooled popular Face Recognition APIs such as Azure Cognitive Services, Amazon Rekognition, and Face++.
    Go to the profile of Sebastian Drygiel
    Sebastian Drygiel
    Aug 5, 2021
    Why is it good to look back at your older iOS application builds?

    Why is it good to look back at your older iOS application builds?

    This article shows why you should always change the secrets in case they were leaked in previous versions of the application.
    Go to the profile of Dawid Pastuszak
    Dawid Pastuszak
    Jun 25, 2021
    Key aspects of secure networking on iOS — Securing

    Key aspects of secure networking on iOS — Securing

    To this day, we encounter programs that use unencrypted HTTP on occasion. This article is all about secure networking on iOS.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Jun 8, 2021
    The twisted world of Android Instance Identifiers and how to deal with it

    The twisted world of Android Instance Identifiers and how to deal with it

    The purpose of this article is to make you aware of the risks associated with improper usage of instance identifiers.
    Go to the profile of Łukasz Bobrek
    Łukasz Bobrek
    May 28, 2021
    Adding security to your SDLC process

    Adding security to your SDLC process

    What difference does threat modeling make? What are the benefits of having a Security Champion? Read more in this article.
    Go to the profile of Mateusz Olejarka
    Mateusz Olejarka
    May 28, 2021
    What can you find in 57K AWS S3 buckets? 2021 update

    What can you find in 57K AWS S3 buckets? 2021 update

    Cloud infrastructure is becoming a standard, but correct access settings still do not seem so obvious. See how we managed to make use of…
    Go to the profile of Paweł Kusiński
    Paweł Kusiński
    Apr 28, 2021
    5 security tips for your macOS environment — Securing

    5 security tips for your macOS environment — Securing

    It is not worth being indulgent with other operating systems. See howyou can align the level of security in your organization.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Apr 28, 2021
    The secure way to store secrets on iOS devices — Securing

    The secure way to store secrets on iOS devices — Securing

    In this article, we will go through available methods and show you the recommended way to do this.
    Go to the profile of Wojciech Reguła
    Wojciech Reguła
    Apr 14, 2021
    Threat Modeling — how to start doing it?

    Threat Modeling — how to start doing it?

    What steps to take for an effective analysis of the attack surface? See our approach to Threat modeling methodology.
    Go to the profile of Jakub Kaluzny
    Jakub Kaluzny
    Apr 12, 2021
    About SecuRingLatest StoriesArchiveAbout MediumTermsPrivacy