In the summer semester of 2024, our "Hacker Contest" will be held again at Darmstadt University (TU) and Darmstadt University of Applied Sciences...
Security Advisory on WeKan
The pentest professionals at usd HeroLab examined the open source application WeKan during their pentests. This application offers users a solution...
Security Advisory on Gambio
The pentest professionals at usd HeroLab examined the online shop software Gambio during their pentests. The software offers merchants various...
Security Advisories for SONIX and SAP
The pentest professionals at usd HeroLab examined SONIX Technology Webcam and SAP Fiori Sample Shop during their pentests. Our professionals...
The Surprising Complexity of Finding Known Vulnerabilities
Most organizations extensively use third-party software products and libraries to increase efficiency and decrease costs. As various data breaches...
Security Advisories for Zimperium and FileCloud
The pentest professionals at usd HeroLab examined Zimperium and FileCloud during their pentests. A critical vulnerability was...
Security Advisories for Gambio
The pentest professionals at usd HeroLab examined the online shop software Gambio during their pentests. The software offers merchants various...
Security Advisories for Planfocus, FileRun, Keycloak and Documize
The Pentest Professionals at usd HeroLab examined Planfocus, FileRun, Keycloak and Documize during their Pentests. During the security analysis...
Security Advisory for IBM QRadar SIEM
The Pentest Professionals at usd HeroLab examined IBM QRadar SIEM during their Pentests. The security information and event management platform...
Pentest of Virtualized Applications (Citrix Breakout Test)
When it comes to providing desktop applications to internal and external company end users, a wide range of virtualized deployment technologies have...