The pentest professionals at usd HeroLab examined Agorum Core Open during the execution of their pentests.. While analyzing the...
Security Analysis
Fat Client Pentests: Inspection and Proxying Network Traffic in Desktop Applications
When testing a desktop application, also referred to as a fat client or thick client, the analysis of network traffic plays a central role in any...
TU meets usd: Students Gain Hands-On Insights into Information Security and Pentesting
During the winter semester 2024/25, students from Technische Universität Darmstadt had the opportunity to participate in two academic cooperations...
Understanding Security Code Reviews, Greybox and Whitebox Pentests: Which Method Is Right for You?
As the number of cyber attacks continues to rise, effective security analysis is more crucial than ever in protecting software and data. In...
Hacker Contest Winter Semester 2024/2025: TU Students Contribute to #moresecurity
Identifying vulnerabilities, taking responsibility, creating real security – and learning in a hands-on way: That’s what the Hacker Contest at TU...
From the Beverage Store to the Corporate Network – When the Deposit Machine Becomes a Gateway for Hackers
Deposit container full – container not recognized – brand not accepted by the market: If you are a frequent consumer of bottled drinks in Germany,...
Security Advisories on SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad und Webswing
The pentest professionals at usd HeroLab examined SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad and Webswing during their...
When Pentest Planning Becomes a Game of Tetris - A Look behind the Scenes of an Extensive Pentest Project with HanseMerkur
In a world where security and efficiency must go hand in hand, our recent project with HanseMerkur Krankenversicherung AG shows how crucial good...
Security Advisory on AXIS Webcam
The pentest professionals at usd HeroLab examined the AXIS Webcam (P1364) during their pentests. Our professionals discovered a vulnerability...
Hacker Contest Challenge of Summer Semester 2024: Sample Solution online
This summer semester, the "Hacker Contest" will be taking place again at the Technical University (TU) Darmstadt and Darmstadt University of Applied...
The Surprising Complexity of Finding Known Vulnerabilities
IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and...
Security Advisories for Zimperium and FileCloud
The pentest professionals at usd HeroLab examined Zimperium and FileCloud during their pentests. A critical vulnerability was...








