"The Hacker Contest is a valuable component of our mission. Because giving students a hands-on understanding of the importance of penetration...
SECURITY ANALYSIS
Security Advisory for Windows Admin Center
The analysts at usd HeroLab examined the centralized management tool Windows Admin Center while conducting their security analyses. During...
Are you Vulnerable to Attacks from the Internet? A Pentest Provides Answers
Organizations are increasingly facing sophisticated cyberattacks and threats. Often, businesses are not aware of which parts of their technical...
Security Advisory for MultiTech Conduit AP MTCAP2-L4E1
The analysts at usd HeroLab examined the LoRaWAN access point MultiTech Conduit AP MTCAP2-L4E1 while conducting their security analyses....
Critical Foswiki Vulnerablities: A Logic Error Turned Remote Code Execution
Our Pentest Professionals at usd HeroLab love open source software as much as anyone. However, it should be secure as well. This is why Christian...
Security Advisories for Foswiki
The analysts at usd HeroLab examined the Foswiki application while conducting their security analyses. They identified vulnerabilities in...
How do I evaluate the offer and quality of a pentest provider?
Nowadays, increasing numbers of security standards and norms require companies to conduct regular penetration tests (pentests for short). For...
Technical Security Analysis and Penetration Testing: usd AG Visits Technical University of Munich for Guest Lecture
On May 22, 2023, Matthias Göhring, Head of usd HeroLab, gave a guest lecture on the topic of technical security analyses and pentesting at TUM as...
Security Advisory for Tracim
The analysts at usd HeroLab examined the Tracim collaboration platform while conducting their security analyses. They identified a...
Security Advisory for Microsoft Windows
The analysts at usd HeroLab examined various operating system versions of microsoft windows while conducting their security analyses. While...
Security Advisories for Friendica
The usd HeroLab analysts examined the Friendica application while conducting their security analyses. It is an open source software to set up a...
How to Efficiently Manage the Results of Technical Security Analyses
IT infrastructures are becoming ever more complex, threats ever more critical. Hence, it is crucial for companies to have a comprehensive overview...