Securing https://www.securing.pl/en/ Mon, 17 Feb 2025 13:31:06 +0000 en-US hourly 1 https://www.securing.pl/wp-content/uploads/2020/09/favicon.png Securing https://www.securing.pl/en/ 32 32 CVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server https://www.securing.pl/en/cve-2025-26788-passkey-authentication-bypass-in-strongkey-fido-server/ Fri, 14 Feb 2025 12:10:30 +0000 https://www.securing.pl/?p=14906 A vulnerability in the StrongKey FIDO Server Non-Discoverable Credential Authentication flow allowed to take over an account of any user.

The post CVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server appeared first on Securing.

]]>
The year in review: The most interesting Single Sign-On vulnerabilities of 2024 https://www.securing.pl/en/the-year-in-review-the-most-interesting-single-sign-on-vulnerabilities-of-2024/ Mon, 27 Jan 2025 11:52:01 +0000 https://www.securing.pl/?p=14721 Check out a summary of 2024’s most interesting Single Sign-On vulnerabilities, and make sure your company is not vulnerable to last year’s security misconfigurations.

The post The year in review: The most interesting Single Sign-On vulnerabilities of 2024 appeared first on Securing.

]]>
CVE-2024-50603: Aviatrix Network Controller Command Injection Vulnerability https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/ Tue, 07 Jan 2025 14:14:06 +0000 https://www.securing.pl/?p=14135 Due to the improper neutralization of the user-controllable input before it is passed for the execution, an unauthenticated attacker can send a payload that is executed on the Aviatrix Network Controller.

The post CVE-2024-50603: Aviatrix Network Controller Command Injection Vulnerability appeared first on Securing.

]]>
New Year, New IAM: A reasonable approach to Identity and Access Management in 2025 https://www.securing.pl/en/new-year-new-iam-a-reasonable-approach-to-identity-and-access-management-in-2025/ Tue, 17 Dec 2024 14:45:25 +0000 https://www.securing.pl/?p=14044 As 2024 ends, it's the perfect time to reflect on what 2025 might bring for Identity and Access Management (IAM). This article offers practical New Year's resolutions to enhance your company's IAM security with achievable goals.

The post New Year, New IAM: A reasonable approach to Identity and Access Management in 2025 appeared first on Securing.

]]>
Making iOS apps secure with iOS Security Suite (ISS) https://www.securing.pl/en/making-ios-apps-secure-with-ios-security-suite-iss/ Wed, 11 Dec 2024 14:44:28 +0000 https://www.securing.pl/?p=14007 iOS Security Suite (ISS) is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift!

The post Making iOS apps secure with iOS Security Suite (ISS) appeared first on Securing.

]]>
Red Teaming in practice: Physical Security Testing tutorial https://www.securing.pl/en/red-teaming-in-practice-physical-security-testing-tutorial/ Tue, 05 Nov 2024 19:54:57 +0000 https://www.securing.pl/?p=13928 Red teaming represents a unique approach to assessing an organization's security posture. Learn how to hack access control systems and RFID readers and break into organizations with style.

The post Red Teaming in practice: Physical Security Testing tutorial appeared first on Securing.

]]>
Baking Mojolicious Cookies revisited: a case study of solving security problems through security by obscurity https://www.securing.pl/en/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-obscurity/ Tue, 29 Oct 2024 09:03:46 +0000 https://www.securing.pl/?p=13877 Known for its agility and simplicity, the Mojolicious framework is especially valued in niche industries with a Perl heritage. In our recent security assessment, the use of under-the-radar technology introduced unique features and challenges. Learn how we overcame these difficulties.

The post Baking Mojolicious Cookies revisited: a case study of solving security problems through security by obscurity appeared first on Securing.

]]>
Security of External Dependencies in CI/CD Workflows https://www.securing.pl/en/security-of-external-dependencies-in-ci-cd-workflows/ Wed, 09 Oct 2024 12:34:11 +0000 https://www.securing.pl/?p=13672 Use of external dependencies in build processes brings common security risks related to code integrity. But have you considered all of them?

The post Security of External Dependencies in CI/CD Workflows appeared first on Securing.

]]>
Azure Single Sign-On Case Study #3: Secure authentication for Function Apps https://www.securing.pl/en/azure-single-sign-on-case-study-3-secure-authentication-for-function-apps/ Wed, 04 Sep 2024 09:26:58 +0000 https://www.securing.pl/?p=13530 General guidance on Azure Function App authentication setup for different client types.

The post Azure Single Sign-On Case Study #3: Secure authentication for Function Apps appeared first on Securing.

]]>
Light & agile approach to threat modeling https://www.securing.pl/en/light-agile-approach-to-threat-modeling/ Wed, 07 Aug 2024 11:44:49 +0000 https://www.securing.pl/?p=13480 A comprehensive introduction to Who-What-How Threat Modeling methodology.

The post Light & agile approach to threat modeling appeared first on Securing.

]]>