Trust Service Provider
Configuration review and penetration test of a Kubernetes cluster
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Web application penetration test of a solution for registering pets, including various APIs
Web application penetration test of an insurance portal with a special focus on the possibility to access data of other users
Spear phishing campaign and awareness training on phishing, strong passwords and the darknet
Web application penetration test of a web application for asking questions which are then answered by the community or company
Scenario-based red teaming attacks agains a custody platform for crypto currencies
Security audit including a partial code review of a mobile app that allows users to centrally manage their financial resources and bank accounts
Application penetration test of a Mac client for managing bank accounts and partial code review of security-relevant parts of the source code
Development of an incident response plan; during the design phase, new virtual teams were defined, the various company departments were involved in the project and their awareness of information security incidents was raised.
Penetration test of a new 2FA implementation within a web application
Penetration test of a public API for accessing bank data and a web application for offering public APIs
Developing an information security policy including subsequent training
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: