Skip to main content

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. » read more

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. » read more

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. » read more

Digital Forensics and Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. » read more

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. » read more

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. » read more

Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. » read more

Calendar

In our penetration tests we regularly identify the same weaknesses with different customers. Moreover, we often realize that the responsible IT people…

Read more

The Hacking Day 2021 will present the most common scenarios hackers use for attacks. Cyrill Brunschwiler shows how you can defend against the relevant…

Read more

In the 2-day course (in German) you will get to know and understand the methods, tools and tricks of social engineering.

Read more

News

Stephan Sekula identified an XSS vulnerability in the report generation tool Canopy.

Read more

Alex Joss and Emanuele Barbeno identified vulnerabilities in Intland Software´s Application-Lifecycle-Management codeBeamer.

Read more

Sylvain Heiniger and Alex Joss identified vulnerabilities in Avaya Equinox® Conferencing, an all-inclusive solution for voice, video and desktop…

Read more

Blog

Due to recent developments we figured it would be great to contribute a cheat sheet and create security best-practices on how to tie down a Microsoft…

Read more

We show how to decrypt passwords from the configuration backup of a Xerox WorkCentre and how, during the reverse engineering, a command injection…

Read more