The pentest professionals at usd HeroLab examined the open source application WeKan during their pentests. This application offers users a solution...
Penetration Test
DORA Deep Dive: Threat-Led Penetration Testing (TLPT)
The Digital Operational Resilience Act (DORA) will apply as of January 17, 2025. In addition to routine operational resilience testing, DORA will...
Secure or Not Secure, That Is the Question: “Cyber Security Assessments in Practice” at TU Munich
What are the different types of cyber security assessments? Why do companies undergo such security assessments? And how exactly does it work? Nico...
One Step Ahead of Attackers - Guest Lecture on Practical Penetration Testing at Hochschule München University of Applied Sciences
"Hacking" has never been as easy as it is today - with this theory, our expert for technical security analysis Tim Wörner began his guest lecture on...
Security Advisories for Gibbon Edu
The Pentest Professionals of the usd HeroLab have analyzed the open source educational software Gibbon Edu during their Pentests....
Hacker Contest Challenge WiSe 23/24: Sample Solution online
30 students from Technical University (TU) Darmstadt have qualified to attend "Hacker Contest" in the winter semester 2023/24 by successfully...
Hacker Contest At The TU Darmstadt Enters The Next Round
"The Hacker Contest is a valuable component of our mission. Because giving students a hands-on understanding of the importance of penetration...
Are you Vulnerable to Attacks from the Internet? A Pentest Provides Answers
Organizations are increasingly facing sophisticated cyberattacks and threats. Often, businesses are not aware of which parts of their technical...
How do I evaluate the offer and quality of a pentest provider?
Nowadays, increasing numbers of security standards and norms require companies to conduct regular penetration tests (pentests for short). For...
What You Should Consider When Ordering Pentests
Penetration tests, or pentests for short, are one of the most important IT security measures that companies can conduct proactively to...
Get started with planning your pentest with these 4 questions
Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to...
10 Tips for Properly Handling Hacker Attacks
Reality shows that it is no longer sufficient to implement only preventive IT security measures. An attack is only a matter of time. Ad-hoc measures...