„This semester we had more registrations for our Hacker Contest than ever before," Markus Schader, Senior Security Consultant at usd HeroLab, is...
Pentest
usd HeroLab Top 5 Vulnerabilities 2020: Cross-Site Scripting (XSS)
During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate...
Security Advisory 03/2021
The usd HeroLab pentesters identified a vulnerability in Check Point’s Identity Agent for Microsoft Windows while conducting their security...
Security Advisory 02/2021
During security analyses usd HeroLab penetration testers have identified two vulnerabilites in the online shop management system Zen Cart and in a...
Next Level Pentesting: Why the classic pentest approach is reaching its limits
For more than 25 years, we have been helping companies achieve more security and monitoring developments and trends. In this interview...
What You Should Consider When Ordering Pentests
Penetration tests, or pentests for short, are one of the most important IT security measures that companies can conduct proactively to...
Security Advisory 01/2021
usd HeroLab penetration testers have identified a path traversal vulnerability during security analyses. This vulnerability affects the product...
Get started with planning your pentest with these 4 questions
Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to...
Security Advisories 10/2020
usd HeroLab penetration testers have identified several security vulnerabilities during security analyses. These vulnerabilities affect the products...
usd AG to Again Teach at TU Darmstadt
During the 2020/2021 winter semester, experienced usd HeroLab security analysts will once again teach the course “Hacker Contest” at the...
10 Tips for Properly Handling Hacker Attacks
Reality shows that it is no longer sufficient to implement only preventive IT security measures. An attack is only a matter of time. Ad-hoc measures...
More Security for Patient Data: Pentest and Cloud Audit at medavis
Compliance requirements are often the driving force behind the necessity of a pentest. However, each company and its IT infrastructure has to...








