Penetration Tests

Penetration Tests

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. read more

Security Reviews

Security Reviews

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. read more

Red Teaming

Red Teaming

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. read more

Incident Response 24/7

Incident Response 24/7

Incident Response 24/7

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. read more

Security Trainings

Security Trainings

Security Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. read more

FileBox

FileBox

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. read more

Hacking-Lab

Hacking-Lab

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. read more

CALENDAR

Security Training: Secure Mobile Apps

In the 2-day course (in German) from October 20/21, 2020, you will learn about the most important security problems of mobile apps. Read more

Security Training: Social Engineering

In the 2-day course (in German) from December 1/2, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

ALL DATES

NEWS

Vulnerability in Mailster

Thierry Viaccoz identified an XSS vulnerability in Mailster (email newsletter plugin for WordPress). Read more

Secure Payments on th Internet

More and more goods and services are bought and paid on the internet. Ivan Bütler summarizes security relevant information on online shopping and... Read more

Vulnerability in Froala WYSIWYG HTML Editor

Security Analyst Emanuel Duss identified a DOM XSS vulnerability in the Froala WYSIWYG HTML Editor Read more

ARCHIVES

Compass Security Blog

Yet Another Froala 0-Day XSS

Compass found a DOM-based cross-site scripting (XSS) in the Froala WYSIWYG HTML Editor. HTML code in the editor is not correctly sanitized when inserted into the DOM. This allows an attacker that can... mehr

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

ZUM BLOG