Original publication date: March 10, 2025. Since the publication of this blog post, BaFin has postponed the deadline for submission from April...
News
DORA News: Deadline for Information Registers, Lift of German Supervisory Requirements for IT in Financial Institutions
Original publication date: January 14, 2025. Since the publication of this blog post, BaFin has postponed the deadline for submission from April 11...
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
EPI External Security Evaluator: usd Receives Accreditation from the European Payments Initiative
usd AG has been accredited as a Security Evaluator by the European Payments Initiative (EPI). We are now authorized to carry out security...
Focus on Cyber Security: The ISF Grey Chapter Spring Meeting 2025 at usd AG
Two days, various perspectives, one common mission: Exchange and networking in the cyber security community. On 13 and 14 March 2025, usd AG hosted...
More Protection Against E-Skimming - PCI Council Publishes New Guide to PCI DSS Requirements 6.4.3 and 11.6.1
The PCI Security Standards Council (PCI SSC) has published a new guide: “Payment Page Security and Preventing E-Skimming - Guidance for PCI DSS...
Top 3 Vulnerabilities in Mainframe Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose...
Security Advisory on Cubro
The pentest professionals at usd HeroLab examined Cubro EXA48200 during the execution of their projects. A vulnerability was discovered in the User...
Implementation of the NIS-2 Directive Has Been Postponed. What Is the Impact on the KRITIS Compliance Audit?
What's next for NIS-2? Due to the early elections in Germany, the parliamentary procedure for the NIS-2 implementation law NIS2UmsuCG could not be...
Top 3 Vulnerabilities in Pentests of Workstations and Company Notebooks
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...
Top 3 Vulnerabilities in Cloud Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...











