Add your offcanvas content in here

The Company

Simplifying your IT-security journey.

Knowledge & News

November 14, 2025 |
by Jan Rude

Privilege Escalation Vulnerability in Alaga Home Security WiFi Camera

The Alaga Home Security WiFi Camera 3K (model S-CW2503C-H) is vulnerable to privilege escalation. Other ...
October 19, 2025 |
by Benjamin Weller

Securely integrate LLMs with the OWASP LLM Top 10 – Part 2: Countermeasures

How can companies reliably protect AI-supported applications? In our follow-up article in "JavaSPEKTRUM" we continue the …
October 10, 2025 |
by Jan Rude

No shell? Host enumeration without CMD and PowerShell

In hardened Windows environments with strict security policies, classic attack methods and even legitimate tools are often blocked. ...
September 24, 2025 |
by David Mendes

Red Teaming research: Hijacking DLLs for initial access

Most of the times red teams and threat actors need to go to extreme lengths ...
September 5, 2025 |
by Robin Hermann

Shift-Left Security: From a stack of tools to a controllable security engine with ATLAS and mgm-sp at your side

Many organizations face the same pattern: few AppSec experts, many developers under high delivery pressure. When security …
External » mgm insights blog
September 4, 2025 |
by Maximiliane Mayer

IT Security – How successful companies securely master digitization

The digital transformation promises companies new opportunities for increasing efficiency, innovation and competitiveness. But without …
September 4, 2025 |
by mgm security partners

Security of Vaultwarden and Keepass analyzed for the BSI

Static Code Analysis (SAST) of Open Source Software On behalf of the German Federal Office for Information Security in the …
September 4, 2025 |
by Mirko Richter

LLM @ Source Code Analysis

Talk at the IT Security Summit: What do LLMs achieve in static code analysis for security? …
August 28, 2025 |
by Björn Kirschner

Identifying and Preventing Remote Code Execution (RCE) with Spring Expression Language (SpEL)

In a recent customer project, we discovered a critical security vulnerability related to Spring Expression Language …
August 14, 2025 |
by Jan Rude

Hardware and Firmware in Focus: Security Analysis of a Home Surveillance Camera (3/3)

When conducting security analyses of IoT devices, a closer look at the hardware is often worthwhile. In …
    What would you like to read?
    What is it about?