A penetration test or pentest provides answers to the question of whether attackers can penetrate your IT infrastructure. There are two ways in...
Pentests & Security Analyses
Top 3 Vulnerabilities in Mobile App Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
The Surprising Complexity of Finding Known Vulnerabilities
IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and...
Secure or Not Secure, That Is the Question: “Cyber Security Assessments in Practice” at TU Munich
What are the different types of cyber security assessments? Why do companies undergo such security assessments? And how exactly does it work? Nico...
Security Assessment at All Levels: Pentest and Cloud Security Audit at Deutsche Fiskal
The need for a pentest is often driven by compliance requirements. However, in many cases, a pentest alone is not enough to make a reliable...
Pentest of Virtualized Applications (Citrix Breakout Test)
Many companies use application virtualization, such as Citrix, to deploy their software on client devices without a local installation. This allows...
Security Advisories for Gibbon Edu
The Pentest Professionals of the usd HeroLab have analyzed the open source educational software Gibbon Edu during their Pentests....
Security Advisories for SuperWebMailer
The usd HeroLab analysts examined the newsletter management tool SuperWebMailer while conducting their security analysis. During the...
Security Advisory for Contao
The usd HeroLab analysts examined the Contao content management system while conducting their security analysis. It is an open source software that...
Security Advisories for SAP
The usd HeroLab's pentest professionals examined applications from the software manufacturer SAP while conducting their pentests. During the...
The Top 3 Security Aspects of Pentests in Automotive Cyber Security
Connected Vehicles: Infotainment. Autonomous Driving. Cloud Backend. Amidst these developments, new opportunities are emerging for businesses, but...
Are you Vulnerable to Attacks from the Internet? A Pentest Provides Answers
Organizations are increasingly facing sophisticated cyberattacks and threats. Often, businesses are not aware of which parts of their technical...