Articles
                                                            
            Natalia Trojanowska-Korepta        
        
                                                    
                                                        2025.02.14
                                                                                                                    ·
                                                            5 MIN reading                                                        												    
                                                
                                            
                                                            
            Natalia Trojanowska-Korepta        
        
                                                    
                                                        2025.01.27
                                                                                                                    ·
                                                            8 MIN reading                                                        												    
                                                
                                            
                                                    
                                                                                                            Infrastructure Security
                                                    
                                                    
                                                CVE-2024-50603: Aviatrix Network Controller Command Injection Vulnerability
                                                            
            Jakub Korepta        
        
                                                    
                                                        2025.01.07
                                                                                                                    ·
                                                            5 MIN reading                                                        												    
                                                
                                            
                                                            
            Natalia Trojanowska-Korepta        
        
                                                    
                                                        2024.12.17
                                                                                                                    ·
                                                            10 MIN reading                                                        												    
                                                
                                            
                                                            
            Wojciech ReguΕa        
        
                                                    
                                                        2024.12.11
                                                                                                                    ·
                                                            2 MIN reading                                                        												    
                                                
                                            
                                                    
                                                                                                            Physical Security
                                                    
                                                    
                                                Red Teaming in practice: Physical Security Testing tutorial
                                                            
            Julia ZduΕczyk        
        
                                                    
                                                        2024.11.05
                                                                                                                    ·
                                                            3 MIN reading                                                        												    
                                                
                                            
                                                    
                                                                                                            Software Development Security
                                                    
                                                    
                                                Baking Mojolicious Cookies revisited: a case study of solving security problems…
                                                            
            Jakub Kramarz        
        
                                                    
                                                        2024.10.29
                                                                                                                    ·
                                                            5 MIN reading                                                        												    
                                                
                                            
                                                    
                                                                                                            Software Development Security
                                                    
                                                    
                                                Security of External Dependencies in CI/CD Workflows
                                                            
            Jakub Kramarz        
        
                                                    
                                                        2024.10.09
                                                                                                                    ·
                                                            6 MIN reading                                                        												    
                                                
                                            
                                                    
                                                                                                            Cloud Security
                                                                                                            Single Sign-On
                                                    
                                                    
                                                Azure Single Sign-On Case Study #3: Secure authentication for Function Apps
                                                            
            Natalia Trojanowska-Korepta        
        
                                                    
                                                        2024.09.04
                                                                                                                    ·
                                                            8 MIN reading                                                        												    
                                                
                                            