Mateusz Olejarka
2026.02.04
·
10 reading
Mobile App Security
From .mlmodel to encrypted .mlmodelc: How Apple Encrypts and Delivers ML Models
Dawid Pastuszak
2026.01.21
·
10 MIN reading
Wojciech Dworakowski
2025.12.07
·
10 reading
Dawid Nastaj
2025.10.28
·
10 MIN reading
Natalia Trojanowska-Korepta
2025.08.14
·
15 MIN reading
Mateusz Olejarka
2026.02.04
·
10 reading
Dawid Nastaj
2025.10.28
·
10 MIN reading
Dawid Nastaj
2024.07.05
·
10 MIN reading
Wojciech Dworakowski
2025.12.07
·
10 reading
App Security
Web App Security
Transaction Authorization Pitfalls – How to improve the current payment ecosystem…
Wojciech Dworakowski
2025.06.24
·
12 MIN reading
Liza Mariot
2023.10.18
·
7 MIN reading
App Security
Storing secrets in web applications using vaults
Aleksander Młodak
2023.04.19
·
17 min reading
Sebastian Drygiel
2023.11.04
·
12 MIN reading
Szymon Chadam
2023.05.04
·
15 MIN reading
Sebastian Drygiel
2021.08.05
·
14 MIN reading
Blockchain and Smart Contracts
Blockchain bridges security & common cross-chain vulnerabilities
Jakub Zmysłowski
2022.07.05
·
8 MIN reading
Blockchain and Smart Contracts
Smart Contracts Audits – how to get the most out of…
Paweł Kuryłowicz
2022.03.10
·
3 MIN reading
Blockchain and Smart Contracts
Front-running attack in DeFi applications – how to deal with it?
Jakub Zmysłowski
2022.01.18
·
5 MIN reading
Blockchain and Smart Contracts
The future security of your smart contracts – upcoming changes in SCSVS
Paweł Kuryłowicz
2021.12.01
·
13 MIN reading
Blockchain and Smart Contracts
Reentrancy attack in smart contracts – is it still a problem?
Paweł Kuryłowicz
2021.09.22
·
7 MIN reading
Łukasz Bobrek
2025.04.17
·
12 MIN reading
Cloud Security
Single Sign-On
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
Natalia Trojanowska-Korepta
2024.09.04
·
8 MIN reading
Krzysztof Demczuk
2024.01.17
·
5 MIN reading
Cloud Security
Cloud Shared Responsibility Model explained
Łukasz Bobrek
2023.04.12
·
10 MIN reading
Cloud Security
Setting up your AWS Monitoring – Security tips
Paweł Kusiński
2022.01.05
·
14 MIN reading
Natalia Trojanowska-Korepta
2025.08.14
·
15 MIN reading
Infrastructure Security
CVE-2024-50603: Aviatrix Network Controller Command Injection Vulnerability
Jakub Korepta
2025.01.07
·
5 MIN reading
Infrastructure Security
5 security tips for your macOS environment
Wojciech Reguła
2021.04.28
·
6 MIN reading
Infrastructure Security
Local Privilege Escalation in macOS infrastructure
Wojciech Reguła
2020.12.09
·
6 MIN reading
Infrastructure Security
Story about hacking security conference and their funny revenge
Wojciech Reguła
2018.04.09
·
3 MIN reading
Infrastructure Security
Several polish banks hit by watering hole attack – lessons learnt?
Wojciech Dworakowski
2017.02.08
·
5 MIN reading
IoT Devices Security
GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool
Sławomir Jasek
2017.06.19
IoT Devices Security
HCE cloning FAQ
Sławomir Jasek
2017.04.11
·
5 MIN reading
Sławomir Jasek
2016.08.05
Wojciech Dworakowski
2015.10.15
Mobile App Security
From .mlmodel to encrypted .mlmodelc: How Apple Encrypts and Delivers ML Models
Dawid Pastuszak
2026.01.21
·
10 MIN reading
Mobile App Security
Threats to consider when integrating Digital ID solutions into your organization
Szymon Chadam
2025.06.03
·
6 MIN reading
Mobile App Security
How we helped secure Poland’s digital ID system – technical analysis
Szymon Chadam
2025.04.11
·
10 MIN reading
Mobile App Security
Hackers vs root detection on Android
Łukasz Bobrek
2023.03.13
·
13 MIN reading
Mobile App Security
Crypto Wallet Security – Video
Dawid Pastuszak
2023.02.21
·
5 MIN reading
Wojciech Reguła
2024.12.11
·
2 MIN reading
Wojciech Reguła
2019.09.01
Our Tools
BucketScanner
Paweł Rzepa
2018.08.30
Our Tools
DumpsterDiver
Paweł Rzepa
2018.08.30
Damian Rusinek
2018.08.30
Physical Security
Mifare Classic cards security
Bartosz Klinowski
2025.07.04
·
15 MIN reading
Julia Zduńczyk
2025.05.14
·
6 MIN reading
Physical Security
Red Teaming in practice: Physical Security Testing tutorial
Julia Zduńczyk
2024.11.05
·
3 MIN reading
Julia Zduńczyk
2025.05.14
·
6 MIN reading
Natalia Trojanowska-Korepta
2025.05.13
·
10 MIN reading
Natalia Trojanowska-Korepta
2025.02.14
·
5 MIN reading
Natalia Trojanowska-Korepta
2025.01.27
·
8 MIN reading
Natalia Trojanowska-Korepta
2024.12.17
·
10 MIN reading
Cloud Security
Single Sign-On
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
Natalia Trojanowska-Korepta
2024.09.04
·
8 MIN reading
Software Development Security
Baking Mojolicious Cookies revisited: a case study of solving security problems…
Jakub Kramarz
2024.10.29
·
5 MIN reading
Software Development Security
Security of External Dependencies in CI/CD Workflows
Jakub Kramarz
2024.10.09
·
6 MIN reading
Software Development Security
Security Features in Financial Applications – our recommendations
Łukasz Bobrek
2021.08.19
·
7 MIN reading
Software Development Security
How to stay secure for longer? Software development case.
Mateusz Olejarka
2021.07.20
·
8 MIN reading
Software Development Security
Adding security to your SDLC process
Mateusz Olejarka
2021.05.04
·
7 MIN reading
Threat Modeling
Light & agile approach to threat modeling
Sebastian Obara
2024.08.07
·
7 MIN reading
Threat Modeling
How to prepare an effective threat modeling session
Sebastian Obara
2023.05.17
·
10 MIN reading
Threat Modeling
Why threat modeling is important
Sebastian Obara
2023.02.13
·
5 MIN reading
Threat Modeling
Threat Modeling – how to start doing it?
Jakub Kałużny
2021.03.30
·
9 MIN reading
Threat Modeling
Thinking what can go wrong? Introduction to Threat Modeling.
Jakub Kałużny
2021.02.17
·
9 MIN reading
Wojciech Dworakowski
2025.12.07
·
10 reading
App Security
Web App Security
Transaction Authorization Pitfalls – How to improve the current payment ecosystem…
Wojciech Dworakowski
2025.06.24
·
12 MIN reading
Web App Security
Next.js-based Application Security Insights
Dawid Nastaj
2025.06.06
·
10 MIN reading
Web App Security
Web Push Notifications and user-targeted attacks – our research
Dawid Nastaj
2024.02.13
·
10 MIN reading
Przemysław Samsel
2022.09.21
·
17 MIN reading
We speak on






Presentation
View all
App Security
AI trick or treat – security implications of ML/AI in our everyday life
Mateusz Olejarka
Nov 15, 2023
App Security
AI trick or treat – security implications of ML/AI in our everyday life
Mateusz Olejarka
Nov 15, 2023
Blockchain
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Damian Rusinek
Dec 03, 2019
