- tl;dr sec
- Archive
- Page 26
Archive
SummarySummary
SummarySummary
SummarySummary
SummarySummary
SummarySummary
Preventing Mobile App and API Abuse
An overview of the mobile and API security cat and mouse game (securely storing secrets, TLS, cert pinning, bypassing protections via decompiling apps and hooking key functionality, OAuth2, etc.), described through an example back and forth between a package delivery service company and an attacker-run website trying to exploit it.
Clint Gibler
SummarySummary
SummarySummary
SummarySummary
SummarySummary
SummarySummary
SummarySummary
Threat Model Every Story: Practical Continuous Threat Modeling Work for Your Team
Izar describes the attributes required by threat modelling approaches in order to succeed in Agile dev environments, how to build an organization that continuously threat models new stories, how to educate devs and raise security awareness, and PyTM, a tool that lets you express TMs via Python code and output data flow diagrams, sequence diagras, and reports.
Clint Gibler