AWS Cognito Security — Cognito User Pool Introduction and User Attributes

AWS Cognito Security — Cognito User Pool Introduction and User Attributes

Unveil the intricacies of Amazon Cognito User Pools in our latest blog post. We delve into the technicalities of user attributes, identifiers, and app clients, guiding you through the login flow and token reception. Discover how to leverage Cognito tokens for data collection and learn to navigate common misconfigurations that developers might miss.

Read More
Vulnerability Research and the Importance of Supporting Young Talent

Vulnerability Research and the Importance of Supporting Young Talent

This is a story with a happy ending where we were able to get back to the collaboration from the early open disclosure days, utilize modern practices to ensure responsible handling of the information, and allow a young person to make a positive contribution to infosec.

Read More