Skip to main content
Compass SecurityCompass Security
Search
  • DE
  • EN
  • Current
    • News
    • Blog
    • Agenda
    • Advisories
  • Services
    • Test d'intrusion
    • Security Reviews
    • Red Teaming
    • Purple Teaming
    • Bug Bounty Managed Service
    • Managed Detection and Response
    • Réponse aux Incidents et Forensics
    • Industrial Cybersecurity
  • Products
    • FileBox
    • Hacking-Lab
  • Trainings
    • Digital Forensics and Incident Response (DFIR)
    • Internal Network and System Security
    • Internet of Things Security
    • Open Source Intelligence (OSINT)
    • Secure Mobile Apps
    • Security Boot Camp
    • Social Engineering
    • Web Application Security Advanced
    • Web Application Security Basic
  • Research
    • Advisories
    • White Paper
    • Presentations
    • Studies
  • Company
    • About us
    • Contact
    • Testimonials
    • Mailing list TIGER-INFO
    • Jobs
  • Contact
    • Free Initial Discussion
    • Sample Report
    • Locations
  • Emergency?
  • DE
  • EN
Search

You are here:

  1. Compass Security
  2. Sitemap

Sitemap

  • Compass Security
    • Current
      • News
      • Blog
      • Agenda
      • Advisories
    • Services
      • Test d'intrusion
      • Security Reviews
      • Red Teaming
      • Purple Teaming
      • Bug Bounty Managed Service
      • Managed Detection and Response
        • Des bases solides pour une surveillance efficace
      • Réponse aux Incidents et Forensics
      • Industrial Cybersecurity
    • Products
      • FileBox
      • Hacking-Lab
    • Trainings
      • Digital Forensics and Incident Response (DFIR)
      • Internal Network and System Security
      • Internet of Things Security
      • Open Source Intelligence (OSINT)
      • Secure Mobile Apps
      • Security Boot Camp
        • Bern, August 31 - September 4, 2026
      • Social Engineering
      • Web Application Security Advanced
      • Web Application Security Basic
    • Research
      • Advisories
      • White Paper
      • Presentations
      • Studies
    • Company
      • About us
      • Contact
      • Testimonials
      • Mailing list TIGER-INFO
      • Jobs
    • Contact
      • Free Initial Discussion
      • Sample Report
      • Locations
    • Emergency?

Blog

WinGet Desired State: Initial Access Established

03.03.2026

While not new, a self-referencing LNK file in combination with winget configuration instructions can be a viable initial access payload for…

Lire la suite

Calendar

VIS Kontaktparty 2026

14.03.2026

On Saturday, 14 March, Switzerland’s next generation of IT professionals will gather at the VIS Contact Party, the largest academic IT recruiting fair…

Lire la suite

News

Vulnerability in Lenovo Vantage

09.02.2026

Security Analyst John Ostrowski identified a vulnerability in Lenovo Vantage, an application provided by Lenovo that helps

to manage computer…

Lire la suite
  • Imprint
  • Legal
  • Sitemap
  • Deutsch
  • English
  • Twitter
  • GitHub
  • LinkedIn
  • RSS