top of page
Secure Coding


What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places
<p>TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly […]</p>
idan ba
Aug 8, 202412 min read


Best Secure Development Practices for Developers
<p>Introduction In the digital age, where software applications are at the heart of daily activities, ensuring their security is of paramount importance. Secure coding practices are the foundation of building software that can withstand evolving cyber threats. In this blog post, we will delve into the fundamentals of secure coding and highlight essential best practices […]</p>
idan ba
Aug 15, 20233 min read
bottom of page

