News
Microsoft Data Breach: Quick Answers Remain Crucial for Companies
The attack on Microsoft Exchange Server is still classified as business-critical by the Federal Office for Information Security (see...
PCI Secure Software Lifecycle Standard eligible for more software vendors
Recently the PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Lifecycle (Secure SLC) Standard and the...
Security Advisory 02/2021
During security analyses usd HeroLab penetration testers have identified two vulnerabilites in the online shop management system Zen Cart and in a...
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
Cyber Security Check Helps Achieve Transparency in Potential IT Risks
With increasing digitalization and more complex IT environments, it is becoming more and more difficult for companies to maintain an overview of the...
usd HeroLab Annual Report 2020: Risks. Consequences. More Security
2020 was a year of special threats – even in the world of IT security. The HeroLab Annual Report reviews the year from the perspective of our...
Incident Response Tabletop – Is Your Company Prepared for an Emergency?
Cyber attacks are an everyday reality for companies – therefore it is important to close any entry gates. However, as this alone is not enough in...
What You Should Consider When Ordering Pentests
Penetration tests, or pentests for short, are one of the most important IT security measures that companies can conduct proactively to...
Security Advisory 01/2021
usd HeroLab penetration testers have identified a path traversal vulnerability during security analyses. This vulnerability affects the product...
From PA-DSS to Secure Software Standard – How to make the transition
The Payment Application Data Security Standard (PA-DSS), the PCI Security Standards Council’s current security standard for payment software...
Get started with planning your pentest with these 4 questions
Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to...
Knowledge Exchange on Cyber Security More Important Than Ever Before
In 2021, knowledge exchange and training on cyber security topics will continue to be of fundamental importance. The CST Academy is therefore...