In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them.
» read more
Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution.
» read more
We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities.
» read more
Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents.
» read more
Sometimes, the good old credential dumping techniques just won't work. This is the story of how a bad actor could dump credentials on a fully-patched,…