Add your offcanvas content in here

Knowledge & News

August 8, 2025 |
by Jan Rude

Hardware and Firmware in Focus: Security Analysis of a Home Surveillance Camera (2/3)

In the first part, we discussed how the firmware can be read from the device...
July 29, 2025 |
by Benjamin Weller

AnythingLLM under the Microscope: Identifying and Addressing Security Flaws

Cross-Prompt-Injection and Markdown-based data exfiltration are known vulnerabilities in LLM systems. We have identified these vulnerabilities in AnythingLLM …
July 25, 2025 |
by André Eikmeier

Drone Software Under Security Review: An Examination of “Drone Harmony for DJI Dock”

“Drone Harmony for DJI Dock” is an application developed by Drone Harmony AG that allows …
July 11, 2025 |
by Benjamin Weller

GenerativeAI for Developers

Talk on the Info Days of Sigs Datacom Large Language Models (LLMs) such as ChatGPT or …
June 27, 2025 |
by Jan Rude

Hardware and Firmware in Focus: Security Analysis of a Home Surveillance Camera (1/3)

As part of an internal research project in the area of hardware security, an internet-based webcam was examined. ...
June 13, 2025 |
by Benjamin Kellermann

Whitebox, Graybox or Blackbox? The right choice for your security test.

Do you also find it difficult to choose the right testing method for your project? You are not alone …
June 6, 2025 |
by Maximiliane Mayer

Security Culture: The Key to Sustainable Cybersecurity

Cybersecurity consists of more than just firewalls, policies, and tools. Above all, it thrives on a …
May 30, 2025 |
by Robin Hermann

More Overview, Less Effort: How ASPM Transforms Your Security Strategy

Rethinking Security in a Fragmented IT Landscape: The security of modern applications is more complex today than ever before …
May 23, 2025 |
by Benjamin Weller

Securely Integrate LLMs with the OWASP LLM Top 10 – Part 1: Risk Analysis

In the last blog post, we looked at the fundamental security threats of Large Language Models (LLMs) …
May 9, 2025 |
by Bastian Braun

Security by Design: How effective is security from the start?

Cyberattacks are now part of everyday life. Companies that rely on reactive security measures not only risk high …
    What would you like to read?
    What is it about?