Knowledge & News


August 8, 2025 |
by Jan Rude
Hardware and Firmware in Focus: Security Analysis of a Home Surveillance Camera (2/3)
In the first part, we discussed how the firmware can be read from the device...
July 29, 2025 |
by Benjamin Weller
AnythingLLM under the Microscope: Identifying and Addressing Security Flaws
Cross-Prompt-Injection and Markdown-based data exfiltration are known vulnerabilities in LLM systems. We have identified these vulnerabilities in AnythingLLM …
July 25, 2025 |
by André Eikmeier
Drone Software Under Security Review: An Examination of “Drone Harmony for DJI Dock”
“Drone Harmony for DJI Dock” is an application developed by Drone Harmony AG that allows …
July 11, 2025 |
by Benjamin Weller
GenerativeAI for Developers
Talk on the Info Days of Sigs Datacom Large Language Models (LLMs) such as ChatGPT or …
June 27, 2025 |
by Jan Rude
Hardware and Firmware in Focus: Security Analysis of a Home Surveillance Camera (1/3)
As part of an internal research project in the area of hardware security, an internet-based webcam was examined. ...
June 13, 2025 |
by Benjamin Kellermann
Whitebox, Graybox or Blackbox? The right choice for your security test.
Do you also find it difficult to choose the right testing method for your project? You are not alone …
June 6, 2025 |
by Maximiliane Mayer
Security Culture: The Key to Sustainable Cybersecurity
Cybersecurity consists of more than just firewalls, policies, and tools. Above all, it thrives on a …
May 30, 2025 |
by Robin Hermann
More Overview, Less Effort: How ASPM Transforms Your Security Strategy
Rethinking Security in a Fragmented IT Landscape: The security of modern applications is more complex today than ever before …
May 23, 2025 |
by Benjamin Weller
Securely Integrate LLMs with the OWASP LLM Top 10 – Part 1: Risk Analysis
In the last blog post, we looked at the fundamental security threats of Large Language Models (LLMs) …
May 9, 2025 |
by Bastian Braun
Security by Design: How effective is security from the start?
Cyberattacks are now part of everyday life. Companies that rely on reactive security measures not only risk high …
What would you like to read?
What is it about?
