You are here:
Over the course of 2025, we performed several hundred security assessments for our clients. In each of these, security analysts must understand a new…
NTLM is the legacy authentication protocol in Windows environment. In the past few years, I've had the opportunity to write on this blog about NTLM…
The gRPC framework, and by extension gRPC-Web, is based on a binary data serialization format. This poses a challenge for penetration testers when…
Something a bit wild happened recently: A rival of LockBit decided to hack LockBit. Or, to put this into ransomware-parlance: LockBit got a post-paid…
The Network and Information Security Directive 2 (NIS2) is the European Union's latest framework for strengthening cyber security resilience across…
On Saturday, 14 March, Switzerland’s next generation of IT professionals will gather at the VIS Contact Party, the largest academic IT recruiting fair…
How can SMEs reduce cyber risks effectively without embarking on complex projects? In 'LEADER digital', Cyrill Brunschwiler shares practical…
More blog posts