Hack2improve - a success story

The Furtwangen University of Applied Sciences offered a hacking workshop for the first time in 2008. What was a novelty at that time is now firmly anchored in the schedule of events of the Faculty of Computer Science. And it all began with an e-mail to Compass Security.

In 2008, Ivan Bütler, co-founder of Compass Security, received an e-mail from Furtwangen University: «Is it possible to organize a big hacking event in Furtwangen?» For sure!

Ivan Bütler has personally attended this Hack&Learn event and remembers: "We provided the infrastructure and the challenges. The room was full, everyone was there with a lot of enthusiasm. A great event!"

Last week the 10th anniversary was celebrated and the "Schwarzwälder Bote" reported on it on May 14: Hacking - Das Thema bleibt hochaktuell

 

You will find further information about this annual hacking event «Hack2Improve» on www.hack2improve.de

CALENDAR

New: Compass-Training "Internal Network and System Security" in Bern

In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more

KMU Swiss Forum 2020

The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more

secIT 2020 – das IT Frühlings-Highlight in Hannover

Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more

ALL DATES

Compass Security Blog

Finding Active Directory attack paths using BloodHound

As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr

ZUM BLOG