Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality...
PENETRATIONSTEST
From Windows 10 to 11: Pentest Protects Against Vulnerabilities After Migration
On October 14, 2025, Microsoft stopped supporting Windows 10, forcing many companies to switch to Windows 11. This not only offers new features but...
Revealing XSS Vulnerabilities in Web Application Pentests: Understanding the Risk
Cross-site scripting (XSS) is one of the most well-known vulnerabilities in web applications, yet our security analysts at usd HeroLab encounter it...
More Security for Connected Systems: Pentesting OT and IoT Systems In a Nutshell
Industrial systems, medical devices, connected machines in production, or embedded systems in vehicles: digitalization even affects systems that...
Fat Client Pentests: Inspection and Proxying Network Traffic in Desktop Applications
When testing a desktop application, also referred to as a fat client or thick client, the analysis of network traffic plays a central role in any...
Hacker Contest Challenge of Summer Semester 2025: Sample Solution online
In the summer semester 2025, the popular “Hacker Contest” at the Technical University of Darmstadt (TU) and Darmstadt University of Applied Sciences...
Red Teaming: Challenge Your Security Architecture With the Final Boss
IT security is no longer just a concern for a company's IT department - it is an integral part of the entire company. However, many security...
Understanding Security Code Reviews, Greybox and Whitebox Pentests: Which Method Is Right for You?
As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
Top 3 Vulnerabilities in Mainframe Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose...
Top 3 Vulnerabilities in Pentests of Workstations and Company Notebooks
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...











