A proactive protection against hacker attacks is essential, especially for systems and applications that are accessible from the Internet. A...
Pentest Insights
SAP Pentest: Identify the Gateways in your SAP Environment in Time
Businesses of all sizes and in all industries use SAP software, and it has become an indispensable part of day-to-day business. SAP system...
Red Teaming - A Controlled Stress Test for Your Company
During the Red Team Assesment, our security experts evaluate the resilience of your security organization against a cyber attack under real-life...
35 Vulnerabilities Discovered in Open Source Software: Hacker Contest Successfully Concluded
In the winter semester 2021/2022, the popular course "Hacker Contest" was again held at the Technical University (TU) Darmstadt. This year, the...
usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
Is Your Mainframe Protected against Hacker Attacks? Our Detailed Security Analysis Provides You with Answers
As complex and exceptionally powerful systems, mainframes significantly exceed the capacities of a typical PC or server. Particularly in industries...
usd HeroLab Top 5 Vulnerabilities 2020: Transport Layer Security (TLS) 1.0
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
usd HeroLab Top 5 Vulnerabilities 2020: SQL Injection
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant...
usd HeroLab Top 5 Vulnerabilities 2020: Broken Access Control
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
usd HeroLab Top 5 Vulnerabilities 2020: Cross-Site Scripting (XSS)
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
usd HeroLab Annual Report 2020: Risks. Consequences. More Security
2020 was a year of special threats – even in the world of IT security. The HeroLab Annual Report reviews the year from the perspective of our...