![SecureAuth Joins OpenID to Drive Interoperability & Authentication for Identity Security Across Cloud & Mobile](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/03/blog-hero-openID-400x284.jpg)
March 29, 2021
Today, SecureAuth is an official member of the OpenID Foundation a non-profit international standardization ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![SecureAuth uncovers SAML validation weakness in SAP HANA](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/12/sap-hana-hero-2-a-400x284.jpg)
December 15, 2020
This blog post details a specific vulnerability affecting SAP’s HANA implementation of the SAML standard. This ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![SecureAuth Innovation Labs – New Impacket Release Available Today!](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/11/sa-labs-tag2-400x284.jpg)
November 23, 2020
As of January 2023, Fortra's Core Security now hosts and maintains Impacket. They will continue to develop both ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/04/20210911_151641-e1635118301493.jpg)
Leandro Cuozzo
![Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/10/blog-thumb-sap-hana-400x284.jpg)
October 21, 2020
We continue our journey into SAP security topics. The following is the third part of a series exploring the HANA ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/09/sap-thumb-400x284.jpg)
August 10, 2020
In this article about SAP security topics, we continue exploring the HANA SQL Command Network Protocol, now ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/09/blog-thumb4-400x284.jpg)
July 20, 2020
With this post we continue our series about enterprise software and SAP security articles. I will cover the basics ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![Why Browser Fingerprinting is Creating Challenges for Identity Security](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/05/blog-thumb14-400x284.jpg)
May 12, 2020
Uniquely identifying the user’s device or browser when accessing an online resource can be useful in very ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![Revisiting the Old and Looking at New Potential SAP Vulnerabilities](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/04/blog-thumb19-400x284.jpg)
April 07, 2020
This post is the first of a series of articles refloating some old notes about enterprise software, SAP security ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![What is old is new again: The Relay Attack](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/04/blog-thumb17-400x284.jpg)
April 07, 2020
The NTLM (NT Lan Manager) relay attack is a well-known attack method that has been around for many years. Anybody ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/04/20210911_151641-e1635118301493.jpg)
Leandro Cuozzo
![Hijacking 2FA – A look at Mobile Malware Through an Identity Lens](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2020/03/blog-thumb20-400x284.jpg)
March 25, 2020
Introduction
In the last weeks, several news outlets reported on a new Android malware variant, that added ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
June 25, 2018
During penetration testing exercises, the ability to make a victim connect to an attacker’s controlled host ...
March 07, 2017
During the past few years, there has been an increasing amount of research around Kerberos security, leading to ...