Data leaks from AWS EC2 – how can Bob reveal Alice’s secrets?

  Author: Paweł Rzepa In this blog post I’m going to show you several ways in which sensitive data from an isolated AWS EC2 instance can be...

Mobile Application Security: Best Practices

  Are you responsible for the process of application creation and development?   In our guide you will find key issues regarding mobile...

Developing Secure Blockchain Applications

  You can find many articles about blockchain because there has been a lot of discussion about this technology in recent years. Blockchain...

GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool

Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes,...

Why should you consider pentesting your cloud?

It is true that migrating your business to the cloud indeed mitigates a lot of risks while comparing to a monolithic architecture. Thanks to the...

Struts security app-ocalypse. IT security manager’s survival guide

Sławek Jasek – IT security expert, SecuRing   The problem  Recently, we have seen one of the most spectacular data breaches in history. Equifax...

Mobile payment card cloning possibilities

  Nowadays we are observing very dynamic adoption of mobile contactless payments. These are systems provided by OS manufacturers (Android Pay,...

HCE cloning FAQ

  HCE cloning FAQ Our research demonstrated that it is possible to copy mobile contactless card data, enrol it to another phone, and use it for...

Several polish banks hit by watering hole attack – lessons learnt?

Wojciech Dworakowski (wojciech.dworakowski@securing.pl, @wojdwo)   Last days Badcyber.com –informed about ongoing attack on polish banks....

Armouring your SaaS #1: My obviously bulletproof SaaS

Mateusz Olejarka (mateusz.olejarka@securing.pl, @molejarka)   Do you enjoy the feeling that your company is the best, and your products –...