News
Security Advisories for Zimperium and FileCloud
The pentest professionals at usd HeroLab examined Zimperium and FileCloud during their pentests. A critical vulnerability was...
Secure or Not Secure, That Is the Question: “Cyber Security Assessments in Practice” at TU Munich
What are the different types of cyber security assessments? Why do companies undergo such security assessments? And how exactly does it work? Nico...
PCI DSS v4.0 – The Most Important Changes at a Glance: Keyed Cryptographic Hashes
Last updated: 30 January, 2024On March 31, 2022, the Payment Card Industry Security Standards Council (PCI SSC) released version 4.0 of the PCI DSS...
Security Advisories for Gambio
The pentest professionals at usd HeroLab examined the online shop software Gambio during their pentests. The software offers merchants various...
Information Security in Third Party Risk Management: The Basics
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
Security Advisories for Planfocus, FileRun, Keycloak and Documize
The Pentest Professionals at usd HeroLab examined Planfocus, FileRun, Keycloak and Documize during their Pentests. During the security analysis...
More than Security: usd Circle 2023
This year, we are once again very grateful for the great commitment of our colleagues to our mission "more security" and beyond. In fact, some of...
One Step Ahead of Attackers - Guest Lecture on Practical Penetration Testing at Hochschule München University of Applied Sciences
"Hacking" has never been as easy as it is today - with this theory, our expert for technical security analysis Tim Wörner began his guest lecture on...
Security Advisory for IBM QRadar SIEM
The Pentest Professionals at usd HeroLab examined IBM QRadar SIEM during their Pentests. The security information and event...
Hacking, Case Studies, Pizza and Mate - a Recap of the usd Student Events
Our student events in the fall were a perfect opportunity to get an insight into the daily work of our colleagues, to ask questions and to get...
Ready for NIS 2? Be the Early Bird!
How to prepare your company for the implementation of the Directive in good time When it comes to implementing the NIS 2 Directive, our experts'...
Guest Lecture at the TU Munich: Practical Insights into Cyber Security Audits and Compliance
Many people don't realize how much influence cyber security standards have on our daily lives. The credit card security standard PCI DSS is a great...