When testing a desktop application, also referred to as a fat client or thick client, the analysis of network traffic plays a central role in any...
PENETRATIONSTEST
Hacker Contest Challenge of Summer Semester 2025: Sample Solution online
In the summer semester 2025, the popular “Hacker Contest” at the Technical University of Darmstadt (TU) and Darmstadt University of Applied Sciences...
Red Teaming: Challenge Your Security Architecture With the Final Boss
IT security is no longer just a concern for a company's IT department - it is an integral part of the entire company. However, many security...
Understanding Security Code Reviews, Greybox and Whitebox Pentests: Which Method Is Right for You?
As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
Top 3 Vulnerabilities in Mainframe Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose...
Top 3 Vulnerabilities in Pentests of Workstations and Company Notebooks
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...
Top 3 Vulnerabilities in Cloud Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
Top 3 Vulnerabilities in API Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Top 3 Vulnerabilites in System Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
Security Advisories on hugocms and Gitea
The pentest professionals at usd HeroLab examined hugocms and Gitea during their pentests. Thereby, several vulnerabilities were identified. The...