Penetration Tests

Penetration Tests

Penetration Tests

Assuming the role of an attacker, we test your devices, networks, services, and applications for vulnerabilities. Using social engineering and red teaming we test the behavior and processes of the whole organization. read more

Security Reviews

Security Reviews

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. read more

Incident Response

Incident Response

Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. read more

Security Trainings

Security Trainings

Security Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. read more

FileBox

FileBox

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. read more

Hacking-Lab

Hacking-Lab

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. read more

CALENDAR

Beer-Talk #17 in Bern: Lazy ways to own networks

Not every attack technique has to be fancy. Often simple methods are successful too. We will show you some of them at our next Beer-Talk in Bern, on... Read more

Internet Security Days 2018

Am 20./21. September 2018 geht es mal wieder hoch hinauf. Im Phantasialand Brühl (bei Köln) findet die 8. Auflage der Internet Security Days (ISD)... Read more

Industrial Cyber Security Days 2018

IT-Security in industriellen Anlagen – sicher in die Zukunft starten! Read more

ALL DATES

NEWS

Vulnerability in VMware AirWatch iOS Applications

Stephan Sekula has identified a vulnerability in the VMware AirWatch iOS applications Read more

Cross-Site Scripting Vulnerability in IBM Notes Traveler

Stephan Sekula has identified a reflected cross-site scripting vulnerability in IBM Notes Traveler. Read more

Vulnerability in Monstra CMS

Fabio Poloni has identified a Path Traversal vulnerability in the Monstra content management system. Read more

ARCHIVES

Compass Security Blog

Hidden Inbox Rules in Microsoft Exchange

Contents Introduction Attack Overview Step-by-Step Detection Email Clients Administration Tools Exchange Compliance Features MAPI Editor Eradication Microsoft Security Response Center Swiss Cyber... mehr

Area41 2018 Wrap Up

Introduction Last Friday and Saturday (15./16. June 2018), the 6th edition of the security conference Area41 (formerly Hashdays, https://area41.io/) organized by DEFCON Switzerland... mehr

ZUM BLOG