Introduction to Zero Trust on AWS ECS Fargate

After a long while of researching for information on a solution I knew I wanted, it was quite hard to figure out what to choose, and how to use it. And so, this is basically the guide I wish I had: what I wanted and why, the solution itself, and just as important - how to implement a solution tha...

 ·  8 minute read  ·   


How to NOT secure web payment systems

Since the tale laid here is real, I’ll refrain from using specific names or locations. It might put me in some awkward situations. If you’ve been through something similar, it may sound familiar. That said, the identifying details have little to do with the story itself. It is not a new or sophis...

 ·  4 minute read  ·   


Hacking your application may be easier than you think

TL;DR: I noticed a suspicious behavior on the weekly email from my coffee shop’s subscription; it was offering I edit my preferences directly through a dedicated link. I was able to bypass the cookie and authentication token (no tricks) and was able to reach an account details panel changing pass...

 ·  6 minute read



5 Things you need to know to optimize your company’s approach to data

Originally published at Authority Magzine on Medium …Most important tip in my opinion is the cliché “put yourself in the attacker’s shoes”. Think how you would break your own system. Is the data transfer encrypted all the way? Can you intercept it on your own? Are their exposed compon...

 ·  17 minute read