You are here:
The development of IoT and OT is growing rapidly every year and is increasingly used in various fields. One protocol commonly used in the IoT and OT…
In the 2-day course (in German) from June 21/22, 2022, you will learn about the most important security problems of mobile apps.
An intensive 5-day hands-on training about IT security.
Berlin companies benefit from a network of experts on their path to digital transformation. Digitalagentur Berlin provides know-how and information,…
Cyrill Brunschwiler explains the latest cyberattack on VMware ESXi and emphasizes the importance of accountability at the executive level.
Marc Tanner identified vulnerabilities in Liima Automation Middleware (AMW).
Sometimes, the good old credential dumping techniques just won't work. This is the story of how a bad actor could dump credentials on a fully-patched,…
The anonymous data on our cases allows us to answer the question "What is a typical DFIR case at Compass Security?" and we conclude its the analysis,…