applied security | Cossack Labs

🇺🇦 We stand with Ukraine, and we stand for Ukraine. We offer free assessment and mitigation services to improve Ukrainian companies security resilience.

Applied security

May 2, 2024

Security autotests for measurable and stable application security processes

Mar 29, 2024

Practical OAuth security guide for mobile applications

Dec 22, 2023

Security tips on using YubiKey and FIDO U2F

Dec 8, 2023

Flutter application security considerations

Sep 8, 2023

Digital payment security: Architecture guide

Jul 13, 2023

How to prevent digital wallet fraud

Mar 23, 2023

Exploring security vulnerabilities in NFC digital wallets

Dec 13, 2022

Smart contract security audit: tips & tricks

Aug 17, 2022

Introduction to automated security testing

Jun 29, 2022

Cryptographic failures in RF encryption allow stealing robotic devices

May 18, 2022

RepoMetaScore: evaluating supply chain risks of open-source repositories

Mar 7, 2022

Cossack Labs stands on guard for security of Ukrainian companies

Feb 15, 2022

React Native libraries: Security considerations

Dec 14, 2021

Crypto wallets security as seen by security engineers

Mar 23, 2021

Shared responsibility model in cloud security: mind the gap

Oct 22, 2020

React Native app security: Things to keep in mind

Sep 14, 2020

Audit logs security: cryptographically signed tamper-proof logs

Jun 10, 2020

How to build OpenSSL for Carthage iOS

Nov 20, 2019

Lift & Shift: cloud security strategy

Oct 28, 2019

How to prepare for data security issues

Sep 5, 2019

Implementing End-to-End encryption in Bear App

May 7, 2019

Install Acra 1-Click App through DigitalOcean Marketplace

Apr 4, 2019

Defense in depth security strategy based on data encryption

Feb 13, 2019

How to prevent SQL injections when WAF’s not enough

Jan 22, 2019

Blockchain & GDPR: dos and don’ts while achieving compliance

Sep 20, 2018

GDPR for software developers: implementing rights and security demands

Aug 16, 2018

Poison Records in Acra – Database Honeypots for Intrusion Detection

Dec 13, 2016

13 tips to enhance database and infrastructure security

Oct 26, 2016

Why making Internet safe is everyone’s responsibility

Sep 21, 2016

Key management in data security: fundamentals

Aug 15, 2016

Backend security: design patterns best practices

Jul 27, 2016

Zero Knowledge Protocols without magic

Jul 20, 2016

Perimeter security: avoiding disappointment, shame and despair

May 23, 2016

Choose your Android crypto (Infographic)

Mar 30, 2016

Crypto in iOS: Choose your destiny (Infographic)

Mar 3, 2016

What's wrong with Web Cryptography

Nov 26, 2015

Why we need novel authentication schemes?

Oct 28, 2015

Why you should avoid SSL for your next application

Contact us

Get whitepaper

Apply for the position

Our team will review your resume and provide feedback
within 5 business days

Thank you!
We’ve received your request and will respond soon.
Your resume has been sent!
Our team will review your resume and provide feedback
within 5 business days