
AWS Cognito Security — Cognito User Pool Introduction and User Attributes
Unveil the intricacies of Amazon Cognito User Pools in our latest blog post. We delve into the technicalities of user attributes, identifiers, and app clients, guiding you through the login flow and token reception. Discover how to leverage Cognito tokens for data collection and learn to navigate common misconfigurations that developers might miss.

AWS Cognito Security — Overview
Discover the hidden security risks in Amazon Cognito with our blog series. Dive into AWS Cognito’s structure, components, and use cases, uncovering new attack vectors and misconfigurations.

AWS Cognito User Pool — Shared User Pools
Explore the risks of shared User Pools in AWS Cognito where users from one app can access another, potentially exposing sensitive resources.
2025 Mobile Platform Fraud Prevention Assessment

3 Pillars of Security at Day 1 Start Ups - Risk

UEFI is the new BIOS
Learn about UEFI reverse engineering and exploit development so that you too can build the skills necessary to find and exploit UEFI bugs, understand common UEFI vulnerabilities, and better secure the firmware security supply chain.