As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...
Pentests & Security Analyses
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
Top 3 Vulnerabilities in Mainframe Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose...
Top 3 Vulnerabilities in Pentests of Workstations and Company Notebooks
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...
Top 3 Vulnerabilities in Cloud Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
Top 3 Vulnerabilities in API Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Top 3 Vulnerabilities in SSO Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
“SAP from an Attacker's Perspective”: usd Experts Speaking at German OWASP Day 2024
The German Chapter of the Open Worldwide Application Security Project (OWASP) is once again organizing its national conference this year. On...
Top 3 Vulnerabilites in System Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
search_vulns - Vulnerability Search Made Easy: The Story Behind the Community Tool
Obtaining a good overview of all known vulnerabilities for software products is often more difficult and complex than one might initially assume....
When Pentest Planning Becomes a Game of Tetris - A Look behind the Scenes of an Extensive Pentest Project with HanseMerkur
In a world where security and efficiency must go hand in hand, our recent project with HanseMerkur Krankenversicherung AG shows how crucial good...