|
You are here |
www.descope.com | ||
| | | | |
www.evasec.io
|
|
| | | | | Multiple vulnerabilities affecting the CocoaPods ecosystem, have been discovered, posing a major risk of supply chain attacks. | |
| | | | |
www.cossacklabs.com
|
|
| | | | | How to implement OAuth in the context of mobile applications while avoiding security pitfalls? Practical steps on fortifying OAuth flow with PKCE, state parameter, managing secure redirections, and focusing on critical aspects during OAuth assessment in mobile environments. | |
| | | | |
fusionauth.io
|
|
| | | | | Explore OAuth and OIDC best practices for mobile apps, including login flows, token storage, and secure authentication using industry standards. | |
| | | | |
palant.info
|
|
| | | Kaspersky applications accept commands from arbitrary websites. Impact reduced by now but not really resolved. | ||