Stork audit by 7ASecurity

7ASecurity shares results of a security audit of Stork (ISC’s admin interface for Kea servers): 7 security-impact findings (2 high) and all fixes verified, plus threat modeling, SLSA review, and an SBOM.

App Penetration Testing: What Happens Behind the Scenes

Modern apps aren’t websites. They need the security to match; they need app penetration testing. Your user app connects to a mobile phone.  It pulls data from the cloud.  Routes through many APIs.  It processes payments through third-party integrations.  Each connection point is a possible gap. Each integration creates complexity. And complexity is where security …