Penetration Tests

Penetration Tests

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. read more

Security Reviews

Security Reviews

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. read more

Red Teaming

Red Teaming

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. read more

Incident Response

Incident Response

Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. read more

Security Trainings

Security Trainings

Security Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. read more

FileBox

FileBox

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. read more

Hacking-Lab

Hacking-Lab

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. read more

CALENDAR

No news available.

NEWS

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

ARCHIVES

Compass Security Blog

Invoice Fraud with Everything the Bag of Tricks Has to Offer

Sometimes, it doesn't take much for a good scam: a good story, a little persuasion, then disappear again… and sometimes, the scammers come up with tactics that come straight out of the textbook. mehr

OWASP – Toronto January 2020

A write-up of the OWASP Toronto January talk which mainly focused on the correlation and integration of results generated by automated tools in application security such as SAST, DAST and SCA.... mehr

ZUM BLOG