Securing https://www.securing.pl/en/ Wed, 14 Feb 2024 13:14:53 +0000 en-US hourly 1 https://www.securing.pl/wp-content/uploads/2020/09/favicon.png Securing https://www.securing.pl/en/ 32 32 Web Push Notifications and user-targeted attacks – our research https://www.securing.pl/en/web-push-notifications-and-user-targeted-attacks-our-research/ Tue, 13 Feb 2024 15:17:29 +0000 https://www.securing.pl/?p=12463 Web push notifications are very common – but also not always secure. In this article, you will discover why and how push notifications can be malicious.

The post Web Push Notifications and user-targeted attacks – our research appeared first on Securing.

]]>
The year in review: the most interesting Single Sign-On vulnerabilities of 2023 https://www.securing.pl/en/the-year-in-review-the-most-interesting-single-sign-on-vulnerabilities-of-2023/ Thu, 25 Jan 2024 16:31:31 +0000 https://www.securing.pl/?p=12386 Check out a summary of 2023’s most interesting Single Sign-On vulnerabilities, and make sure your company is not vulnerable to last year’s security misconfigurations.

The post The year in review: the most interesting Single Sign-On vulnerabilities of 2023 appeared first on Securing.

]]>
Using Azure CLI and PowerShell to secure your Storage Accounts https://www.securing.pl/en/using-azure-cli-and-powershell-to-secure-your-storage-accounts/ Wed, 17 Jan 2024 09:12:49 +0000 https://www.securing.pl/?p=12293 Keeping your cloud infrastructure safe can be tricky. This article shows how to make your environment more secure using Azure CLI and PowerShell for managing the configuration of resources in your subscriptions.

The post Using Azure CLI and PowerShell to secure your Storage Accounts appeared first on Securing.

]]>
Manual vs. automated penetration testing – or maybe both? https://www.securing.pl/en/manual-vs-automated-penetration-testing-or-maybe-both/ Wed, 18 Oct 2023 07:41:57 +0000 https://www.securing.pl/?p=11248 This article shows why manual and automated penetration tests are both important and not interchangeable. You will also find a list of pros and cons of two approaches that will help you make the right choice.

The post Manual vs. automated penetration testing – or maybe both? appeared first on Securing.

]]>
Penetration Testing for Filestack https://www.securing.pl/en/penetration-testing-for-filestack/ Fri, 21 Jul 2023 10:08:29 +0000 https://www.securing.pl/?p=10701 See from the client's perspective what cooperation with us looks like. From the initial interview about the platforms and expectations, through actual security tests up to retests and remediations consulting.

The post Penetration Testing for Filestack appeared first on Securing.

]]>
How to prepare an effective threat modeling session https://www.securing.pl/en/how-to-prepare-an-effective-threat-modeling-session/ Wed, 17 May 2023 13:24:29 +0000 https://www.securing.pl/?p=10456 Every threat modeling session requires thorough preparation. This article will help you create an effective session step by step.

The post How to prepare an effective threat modeling session appeared first on Securing.

]]>
Voice Biometrics – how easy is it to hack them with AI Deepfake? https://www.securing.pl/en/voice-biometrics-how-easy-is-it-to-hack-them-with-ai-deepfake/ Thu, 04 May 2023 10:26:19 +0000 https://www.securing.pl/?p=10278 Voice biometrics are becoming a widely used authentication method. They may be convenient but also vulnerable, especially in the age of AI. Here, you will find my research regarding voice biometrics security.

The post Voice Biometrics – how easy is it to hack them with AI Deepfake? appeared first on Securing.

]]>
Storing secrets in web applications using vaults https://www.securing.pl/en/storing-secrets-in-web-applications-using-vaults/ Wed, 19 Apr 2023 12:20:13 +0000 https://www.securing.pl/?p=10162 There is no one-size-fits-all solution when it comes to storing secrets in web applications. Here, you will learn about the useful features of vaults and best practices for keeping your secrets safe.

The post Storing secrets in web applications using vaults appeared first on Securing.

]]>
Cloud Shared Responsibility Model explained https://www.securing.pl/en/cloud-shared-responsibility-model-explained/ Wed, 12 Apr 2023 13:25:24 +0000 https://www.securing.pl/?p=10048 The cloud computing is the future, and many companies are moving their workloads to the cloud. However, there is a general misconception that the cloud is secure by default. This is simply wrong – many things also depend on the cloud consumers.

The post Cloud Shared Responsibility Model explained appeared first on Securing.

]]>
Hackers vs root detection on Android https://www.securing.pl/en/hackers-vs-root-detection-on-android/ Mon, 13 Mar 2023 04:35:08 +0000 https://www.securing.pl/?p=4601 Since the beginning of time, security researchers and hackers have needed to bypass root detection mechanisms implemented in Android apps. In this article, I will present some bypassing techniques and best practices regarding the implementation of these mechanisms.

The post Hackers vs root detection on Android appeared first on Securing.

]]>