New SecureAuth Release Enables Enterprises to Adapt to Today’s Digital-First, Post-Pandemic Environment
Now Available: Impacket Release v0.9.23

Now Available: Impacket Release v0.9.23

Hi everyone! Today, we are happy to announce a new significant release of Impacket, our collection of Python ...
Leandro Cuozzo
Security Research as a Driver for Identity Security

Security Research as a Driver for Identity Security

Innovation Labs – How Security Research Drives Identity Security One of SecureAuth’s unique strengths is the ...
Martin Gallo
SecureAuth Innovation Labs Sheds Light on Protecting Credentials in SAP HANA: The Client Secure User Store

SecureAuth Innovation Labs Sheds Light on Protecting Credentials in SAP HANA: The Client Secure User Store

A New version of pysap - an Open Source Tool for SAP Protocols and file formats - Now Available SecureAuth ...
Martin Gallo
SecureAuth Joins OpenID to Drive Interoperability & Authentication for Identity Security Across Cloud & Mobile

SecureAuth Joins OpenID to Drive Interoperability & Authentication for Identity Security Across Cloud & Mobile

Today, SecureAuth is an official member of the OpenID Foundation a non-profit international standardization ...
Martin Gallo
SecureAuth uncovers SAML validation weakness in SAP HANA

SecureAuth uncovers SAML validation weakness in SAP HANA

This blog post details a specific vulnerability affecting SAP’s HANA implementation of the SAML standard. This ...
Martin Gallo
SecureAuth Innovation Labs – New Impacket Release Available Today!

SecureAuth Innovation Labs – New Impacket Release Available Today!

Hi everyone! I’m Leandro (@0xdeaddood), a researcher at SecureAuth’s Innovation Labs and one of the primary ...
Leandro Cuozzo
Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

We continue our journey into SAP security topics. The following is the third part of a series exploring the HANA ...
Martin Gallo
Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

In this article about SAP security topics, we continue exploring the HANA SQL Command Network Protocol, now looking
Martin Gallo
Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

With this post we continue our series about enterprise software and SAP security articles. I will cover the basics ...
Martin Gallo
Why Browser Fingerprinting is Creating Challenges for Identity Security

Why Browser Fingerprinting is Creating Challenges for Identity Security

Uniquely identifying the user’s device or browser when accessing an online resource can be useful in very different
Martin Gallo
Revisiting the Old and Looking at New Potential SAP Vulnerabilities

Revisiting the Old and Looking at New Potential SAP Vulnerabilities

This post is the first of a series of articles refloating some old notes about enterprise software, SAP security ...
Martin Gallo
What is old is new again: The Relay Attack

What is old is new again: The Relay Attack

The NTLM (NT Lan Manager) relay attack is a well-known attack method that has been around for many years. Anybody ...
Leandro Cuozzo