You are here:
Over the course of 2025, we performed several hundred security assessments for our clients. In each of these, security analysts must understand a new…
NTLM is the legacy authentication protocol in Windows environment. In the past few years, I've had the opportunity to write on this blog about NTLM…
The gRPC framework, and by extension gRPC-Web, is based on a binary data serialization format. This poses a challenge for penetration testers when…
Something a bit wild happened recently: A rival of LockBit decided to hack LockBit. Or, to put this into ransomware-parlance: LockBit got a post-paid…
The Network and Information Security Directive 2 (NIS2) is the European Union's latest framework for strengthening cyber security resilience across…
On Saturday, 14 March, Switzerland’s next generation of IT professionals will gather at the VIS Contact Party, the largest academic IT recruiting fair…
Swiss broadcaster SRF is dedicating a full week to the theme "Fact or Fake?". In the show "Kassensturz", we had the chance to assist with an…
More blog posts