You are here:
Here you will find reports, interviews and news. We give you an insight into our work and report on 0day (zero-day) vulnerabilities discovered by our staff on customer projects or in their research time.
Page 9 sur 19
Ivan Bütler von Compass Security hat einen aufregenden Digitaltag hinter sich. Seine Live Hacks am Züricher Hauptbahnhof waren ein Publikumsmagnet.
Im Bericht der Eidgenössischen Elektrizitätskommision kommt die Schweizer Stromversorgung diesbezüglich nicht gut weg. Studerus AG hat dazu Cyrill…
Emanuele Barbeno and Lukasz D. have found a method to bypass the Anti-SQL injection filter in Alibaba Druid.
Thierry Viaccoz has identified an XML External Entity (XXE) vulnerability in "The Scheduler" plugin for Jira.
Sylvain Heiniger has identified a "Cleartext Storage of Sensitive Information" vulnerability in the MobileIron application Email+.
Michael Fisler and Felix Aeppli have identified vulnerabilities in the Universal Automation Center (UAC).
eco, der Verband der Internetwirtschaft, befragt Jan-Tilo Kirchhoff, den Geschäftsführer der Compass Security Deutschland zu seinem Workshop auf den…
The Cyber Security Challenge Germany (CSCG) was once again looking for young talents to make Germany's future safer. The online qualification has…
The latest magazine of "Die Mobliliar" focusses on artificial intelligence as well as digitalization - and take a look at cyber crime.
The Furtwangen University of Applied Sciences offered a hacking workshop for the first time in 2008. What was a novelty at that time is now firmly…
Since February 1, 2019 Beat Guldimann has been Managing Director of the new Compass office in Toronto and is in charge of market entry in Canada. We…
The registered non-profit association DsiN provides comprehensive and independent information to consumers and businesses on issues of IT security.…
Renovate is an OSS CLI/bot that updates your software dependencies automatically. It is usually integrated into the CI/CD process and runs on a…
This little-known but increasingly prevalent attack vector exploits vulnerabilities in the Device Code Flow authentication process in Microsoft Entra…