Our understanding

Compass stands for trust, competence, and customer orientation.

Trust

Creating a relationship of trust is our primary goal in working together with our customers. We emphasize personal and transparent communications, firm commitments and absolute confidentiality. Our reputation is built on authenticity and demonstrated through competence.

Competence

We put our in-depth expertise to the test on customer projects every day and are always ready to accept new challenges. Based on a combination of broad experience from our everyday activities, our employees' continuous training, and thirst for new research possibilities, we keep pace with the latest technologies and trends, and continuously adapt our knowledge base and methodology.

Customer orientation

Our personal contact with customers helps us understand the exact requirements, we can give them the project support they expect and react flexibly to any sudden changes in the company environment.

At all times, be it during a kick-off meeting, during the actual security assessment, or in the documentation and debriefing phase, we make a special point of communicating appropriately to whatever interest group we are addressing.


CALENDAR

Security Training: Social Engineering

In the 2-day course (in German) from June 9/10, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

it-sa 2020

Europas führende Fachmesse für IT-Sicherheit findet vom 06. - bis 08. Oktober 2020 im Messezentrum Nürnberg (DE) statt. Reservieren Sie bereits heute... Read more

ALL DATES

NEWS

Sicherheitsrisiken erkennen und reduzieren

Im «KMU Magazin» gibt Security Analyst Fabio Poloni Tipps, wie KMU sich gegen Cyberangriffe wappnen können.  Read more

Vulnerability in the Windows Task Scheduler

Sylvain Heiniger identified a vulnerability in the Windows Task Scheduler. Read more

Ransomware-Attacke: Datendiebe erpressen Schweizer Unternehmen

Die Schweizer Herstellerin von Schienenfahrzeugen Stadler Rail AG wurde Opfer einer Cyber Attacke. Das Vorgehen der Angreifer sei typisch, sagt... Read more

ARCHIVES

Compass Security Blog

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

Reversing a .NET Orcus dropper

In this blog post we will reverse engineer a sample which acts as downloader for malware (aka a “dropper”). It is not uncommon to find such a downloader during DFIR engagements so we decided to take a... mehr

ZUM BLOG