Skip to main content

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. » read more

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. » read more

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. » read more

Digital Forensics and Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. » read more

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. » read more

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. » read more

Calendar

Europe's leading trade fair for IT security takes place on October 25-27, 2022, Nuremberg (DE). Be there!

Read more

Safe the date: Swiss Cyber Storm in Berne (CH). Tuesday, October 25, 2022.

Read more

News

Emanuele Barbeno identified a XSS and a CSRF vulnerability in Microsoft Power BI.

Read more

Stephan Sekula identified a XSS vulnerability in Canopy.

Read more

Adrian Kress identified a XSS vulnerability in the audit management system TeamMate+.

Read more

Blog

The ntds.dit file from a domain controller contains all password hashes of the domain. In a company with employees around the globe we were allowed…

Read more

Passwordless products promise greater security and convenience by allowing users to log in to Windows systems with only their smartphone. But what is…

Read more