Skip to main content

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. » read more

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. » read more

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. » read more

Digital Forensics and Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. » read more


FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. » read more


Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. » read more


Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. » read more


The news about cyber attacks is omnipresent. In most cases, the actions of the actors are portrayed as extremely sophisticated and their arsenal as…

Read more

Safe the date: October 12, 2021, Kursaal Bern

Read more

Safe the date: October 12 - 14, NürnbergMesse

Read more


Emanuel Duss identified a biometric authentication bypass vulnerability in the Ionic Identity Vault secure storage solution on Android.

Read more

Philipp Mao identified a hardcoded credentials vulnerability in the electronic time recording system timeCard

Read more

Emanuele Barbeno identified a vulnerability in the open source software NeDi.

Read more


During a customer project, we could bypass the biometric authentication mechanism of Ionic Identity Vault on Android, because the Android KeyStore…

Read more

A little bit over a year ago, I wrote an article on this blog about CVE-2020-1113 and how it enabled to execute code on a remote machine through…

Read more