The German Federal Office for Information Security (BSI) has published two new sets of criteria for evaluating Artificial Intelligence (AI). They...
Pentests & Security Analyses
How to Strengthen Your Email Security: Insights from Our Pentesters
Email security is a key factor in application development and system configuration. Vulnerabilities in this environment can lead to data leaks and...
More Security for Connected Systems: Pentesting OT and IoT Systems In a Nutshell
Industrial systems, medical devices, connected machines in production, or embedded systems in vehicles: digitalization even affects systems that...
Security Advisories on Agorum Core Open
The pentest professionals at usd HeroLab examined Agorum Core Open during the execution of their pentests.. While analyzing the...
Fat Client Pentests: Inspection and Proxying Network Traffic in Desktop Applications
When testing a desktop application, also referred to as a fat client or thick client, the analysis of network traffic plays a central role in any...
Red Teaming: Challenge Your Security Architecture With the Final Boss
IT security is no longer just a concern for a company's IT department - it is an integral part of the entire company. However, many security...
usd AG globally Re-Accredited as an Approved Scanning Vendor (ASV)
On April 30, 2025, usd AG received global accreditation as an Approved Scanning Vendor (ASV) from the Payment Card Industry Security Standards...
Understanding Security Code Reviews, Greybox and Whitebox Pentests: Which Method Is Right for You?
As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
Top 3 Vulnerabilities in Mainframe Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose...
Top 3 Vulnerabilities in Pentests of Workstations and Company Notebooks
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...











