Skip to main content

Penetration Tests

In the role of the hacker, we test devices, networks, services and applications as well as the behavior of employees. We uncover vulnerabilities and provide you with recommendations on how to fix them. » read more

Security Reviews

Experienced IT analysts support you with a second opinion on security concepts and if requested, test the structure, configuration, and source code of your solution. » read more

Red Teaming

We go after your critical assets like an adversary would do and aim to fulfil pre-defined missions. It is the goal of red teaming to measure and improve your organization's detection and response capabilities. » read more

Digital Forensics and Incident Response

Our experts help in coordinating incident and emergency measures as well as with the processing of data for use in court. Additionally, we provide quick and accessible research into the cause of incidents. » read more

FileBox

FileBox is a solution for both secure file transfer and secure file storage. It provides you with the ability to securely exchange documents. » read more

Hacking-Lab

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. » read more

Trainings

Benefit from our analysts' knowledge of penetration testing, network analysis, digital forensics, secure mobile apps, and other applications, or choose to receive training in our specially created lab. » read more

Calendar

In April, the IWS Internationaler Wirtschaftssenat e.V. invites decision-makers from economy, politics and science to a virtual roundtable with…

Read more

In this seminar (in German) you develop an in-depth understanding of the security of modern, distributed web application and associated technologies.

Read more

In this hands-on seminar (in German) you will learn about internal network attacks and how you can protect your systems from them.

Read more

News

In its latest magazine, «RegionalWirtschaft» has focused to cybercrime and interviewed Compass Co founder Ivan Bütler. Take a look over the shoulders…

Read more

Do internal penetration tests always have to be conducted where the infrastructure is located?

Read more

What are the consequences of a cyber attack on your SME? An affected CEO describes his experiences in the latest webcast of ZKB Zürcher Kantonalbank.

Read more

Blog

SAML Raider 1.4.0 is out which contains several new features like UI changes, new text editor, raw mode, XSW match/replace, parameter name definition…

Read more

A post on how to trick browsers to work as a gateway to internal web servers and IoT devices, the concepts behind and how to easily exploit DNS…

Read more