Are you passionate about IT security and are wondering how you can get started in a career as a pentester or penetration tester? Matthias Göhring,...
PENTEST
Security Advisory for Microsoft Windows
The analysts at usd HeroLab examined various operating system versions of microsoft windows while conducting their security analyses. While...
Hacker Contest summer semester 2023: Sample solution of the challenge online
In the 2023 summer semester, our "Hacker Contest" at Technical University (TU) Darmstadt and at Darmstadt University of Applied Sciences (h_da) will...
Single Sign-on: Usage. Risks. Tips for more Security.
Companies can benefit from the use of Single Sign-on (SSO), but it also entails many risks. Gerbert Roitburd, Senior Consultant at usd HeroLab and...
Security Advisories for Friendica
The usd HeroLab analysts examined the Friendica application while conducting their security analyses. It is an open source software to set up a...
How to Efficiently Manage the Results of Technical Security Analyses
IT infrastructures are becoming ever more complex, threats ever more critical. Hence, it is crucial for companies to have a comprehensive overview...
Security Advisories for NCP Secure Enterprise Client
The usd HeroLabs analysts examined the VPN application NCP Secure Enterprise Client during their security analyses. Several high vulnerabilities and...
Security Advisories for Seafile
The usd HeroLab analysts examined the application Seafile while conducting their security analyses. The application can be used to set up a...
Security Scan and Pentest: What are the Differences?
A proactive protection against hacker attacks is essential, especially for systems and applications that are accessible from the Internet. A...
Security Advisories for Jellyfin
The usd HeroLab analysts examined the multimedia application Jellyfin while conducting their security analyses. Two cross-site scripting...
Security Advisory for GitLab
The usd HeroLab analysts examined GitLab, a service for version management of software projects, while conducting their security analyses. In the...
SAP Pentest: Identify the Gateways in your SAP Environment in Time
Businesses of all sizes and in all industries use SAP software, and it has become an indispensable part of day-to-day business. SAP system...