You are here:
Here you will find reports, interviews and news. We give you an insight into our work and report on 0day (zero-day) vulnerabilities discovered by our staff on customer projects or in their research time.
Page 8 of 13
Silas Bärtsch identified a vulnerability in VeloCloud™ (VMware), that allows a VeloCloud standard admin user to access user information of other…
Cyber attacks on organizations can be categorized into four different groups. Ivan Bütler tells at Zürichsee-Zeitung what these are.
Emanuele Barbeno and Lukasz D. have found a method to bypass the Anti-SQL injection filter in Alibaba Druid.
Thierry Viaccoz has identified an XML External Entity (XXE) vulnerability in "The Scheduler" plugin for Jira.
Sylvain Heiniger has identified a "Cleartext Storage of Sensitive Information" vulnerability in the MobileIron application Email+.
Michael Fisler and Felix Aeppli have identified vulnerabilities in the Universal Automation Center (UAC).
The Cyber Security Challenge Germany (CSCG) was once again looking for young talents to make Germany's future safer. The online qualification has…
The latest magazine of "Die Mobliliar" focusses on artificial intelligence as well as digitalization - and take a look at cyber crime.
The Furtwangen University of Applied Sciences offered a hacking workshop for the first time in 2008. What was a novelty at that time is now firmly…
Since February 1, 2019 Beat Guldimann has been Managing Director of the new Compass office in Toronto and is in charge of market entry in Canada. We…
The registered non-profit association DsiN provides comprehensive and independent information to consumers and businesses on issues of IT security.…
Lukasz D. has identified an XSS vulnerability in the Web User Interface of the Vigor2960 DrayTek router.
As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you…
In the 3-day seminar (in German) you will get to know the most important basic concepts of IT security, attack tools and methods.