In the summer semester 2025, the popular “Hacker Contest” at the Technical University of Darmstadt (TU) and Darmstadt University of Applied Sciences...
News
TU meets usd: Students Gain Hands-On Insights into Information Security and Pentesting
During the winter semester 2024/25, students from Technische Universität Darmstadt had the opportunity to participate in two academic cooperations...
Red Teaming: Challenge Your Security Architecture With the Final Boss
IT security is no longer just a concern for a company's IT department - it is an integral part of the entire company. However, many security...
Joint Success: Partners Support German Automotive Manufacturer along the Journey to PCI Compliance
Regardless of the business sector, customers value flexibility when it comes to processing payments for services and products. A leading German...
BoostAeroSpace and usd AG: A Partnership for More Security in the Aerospace Industry
In today’s business environment, companies rely on a broad network of partners and service providers to deliver their services efficiently. Digital...
Security Advisory on Element X Android
Our analysts at the usd HeroLab discovered during their pentests that a locally installed malicious app can cause the Android application Element X...
usd AG globally Re-Accredited as an Approved Scanning Vendor (ASV)
On April 30, 2025, usd AG received global accreditation as an Approved Scanning Vendor (ASV) from the Payment Card Industry Security Standards...
SWIFT CSCFv2025: Current Version of the Framework Brings Changes for Architecture Type B
Since its introduction in 2017, the Customer Security Controls Framework (CSCF) has aimed to strengthen the security of the SWIFT network. The aim...
7 Questions about the Cyber Resilience Act (CRA)
1. What is the Cyber Resilience Act? With the Cyber Resilience Act (CRA for short), the EU is introducing a regulation for the first...
New Requirements of ISO/IEC 27006-1:2024: What Changes Do They Bring for Your Audit?
ISO/IEC 27006-1:2024 contains the formal requirements for certification bodies that must be implemented when auditing an information security...
Security Advisory on Element Android
The pentest professionals at usd HeroLab examined the Element application for Android during their pentests. They identified a vulnerability in the...
Understanding Security Code Reviews, Greybox and Whitebox Pentests: Which Method Is Right for You?
As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...










