News
usd OrangeBox makes remote pentests simple
Many companies ask themselves whether attackers are able to compromise their IT infrastructure. Pentests provide reliable results to this...
Security Advisory 06/2020
usd HeroLab penetration testers have identified several security vulnerabilities during security analyses. These vulnerabilities affect the...
#SayNoToRacism
Our Hero is wearing black. Usually we are not political. But special times require special measures and there are things we just cannot leave...
usd AG accredited as Software Security Framework Assessor Company
usd AG has been accredited by the PCI Security Standards Council (PCI SSC) as a Software Security Framework Assessor Company and is...
Efficient Compliance Audits of Your Service Providers
Outsourcing certain tasks to external service providers has become an integral part of business operations. Whether it’s data center services,...
Security Advisory 04/2020
usd HeroLab penetration testers have identified several security vulnerabilities during security analyses. These vulnerabilities affect the...
Pentest Scope: How to Determine the Testing Scope?
Pentests are one of the most effective security analysis methods to check the IT security level of a company and identify opportunities for...
Current Information on Remote Assessments according to PCI Security Standards
In order to slow down the spread of the coronavirus, many countries have imposed movement restrictions and travel bans. Of course, we adhere...
A step towards more security: Our expert’s examination of the PCI Software Security Framework
In January 2019, the PCI Security Standards Council first announced the introduction of the new Software Security Framework (SSF) which...
Security Advisory 02/2020
usd HeroLab penetration testers have identified several security vulnerabilities during security analyses. These vulnerabilities affect the...
What is Responsible Disclosure?
The security analysts of usd HeroLab frequently discover previously unknown security vulnerabilities in products as part of their daily...
What are the pentest analysis approaches?
Attackers gaining unauthorized access to IT systems and applications has severe consequences for companies. Pentests identify possible...