You are here:
Here you will find reports, interviews and news. We give you an insight into our work and report on 0day (zero-day) vulnerabilities discovered by our staff on customer projects or in their research time.
Page 6 sur 19
Do internal penetration tests always have to be conducted where the infrastructure is located?
What are the consequences of a cyber attack on your SME? An affected CEO describes his experiences in the latest webcast of ZKB Zürcher Kantonalbank.
Lukasz D. identified a "Privilege Escalation" vulnerability in the “Amaze File Manager” app for Android.
Thierry Viaccoz, Sylvain Heiniger and Fabio Poloni identified several vulnerabilities in the AdRem NetCrunch monitoring solution.
Alex Joss and Emanuele Barbeno identified an XXE vulnerability in the Intland codeBeamer ALM solution.
Marat Aytuganov identified vulnerabilities in Gradle Enterprise. These have been patched in version 2020.2.5
Mobile applications have become indispensable in the business environment. When developing or choosing applications, there are some important points…
TIBER-EU is the new European framework for more cyber resilience of the financial system.
Mount10's best practice guide gives SMEs important recommendations to make IT safer.
Felix Sieges has found a vulnerability in the FusionAuth library SAML v2.0 bindings in Java using JAXB. Fixed version is fusionauth-samlv2 0.2.4.
…
For the 10 years anniversary of «IT-Markt» Ivan Bütler, co-founder of Compass Security, has been asked to share his personal opinion about the future…
Thierry Viaccoz identified a “Privilege Escalation” vulnerability in Checkmk (IT-Monitoring-Software).
Red Teaming engagements are “realistic” attack simulations designed to test the security posture of an organization and its Blue Team. This term is…
The integrity and availability of data is crucial for the smooth operation of public transport. In this workshop, developed by onway ag and Compass…