Penetration Tests

Penetration Tests

Penetration Tests

Assuming the role of an attacker, we test your devices, networks, services, and applications for vulnerabilities. Using social engineering and red teaming we test the behavior and processes of the whole organization. read more

Security Reviews

Security Reviews

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. read more

Incident Response 24/7

Incident Response 24/7

Incident Response 24/7

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. read more

Security Trainings

Security Trainings

Security Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. read more

FileBox

FileBox

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. read more

Hacking-Lab

Hacking-Lab

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. read more

CALENDAR

CodeMash 2019, Sandusky/Ohio

CodeMash - a unique event for developers Read more

ALL DATES

NEWS

Fast and competent support in case of cyber incidients

The editorial staff of the Unternehmerzeitung has taken up the topic of cyber security again and in an interview sheds light on how the cooperation... Read more

Vulnerability in HADatAc Framework

Lukasz D. has identified a remote code execution vulnerability in the Human-Aware Data Acquisition (HADatAc) framework. Read more

HSR opportunities and risks of the digitalization - what it means to the job market in the ICT industry

In the advanced training course BSLB / RAV / IV of the HSR Hochschule für Technik the topic "Opportunities and risks of digitalization and the labour... Read more

ARCHIVES

Compass Security Blog

Substitutable Message Service

Have you ever said something and later regretted it? Or written an email to someone and then wished it had not happened? Or sent an SMS message but afterward desired to change its content? Well,... mehr

Hidden Inbox Rules in Microsoft Exchange

Contents Introduction Attack Overview Step-by-Step Detection Email Clients Administration Tools Exchange Compliance Features MAPI Editor Eradication Microsoft Security Response Center Swiss Cyber... mehr

ZUM BLOG