English
English
Deutsch
Open main menu
Cybersecurity
Software Reverse Engineering
Analyze malware, understand legacy software, audit custom applications
Penetration Tests & Red-Teaming
Vulnerability checks and controlled cyberattacks
Security Engineering
Consulting and implementation of secure IT infrastructures
Digital Forensics & Incident Response
Support for investigation and response to IT security incidents
Compliance
Data Protection
External GDPR Data Protection Officers & more
ISO/IEC 27001
External Information Security Officers, Consultation & Audits
Awareness
Data Protection
Data protection training for employees
Knowledge
Blog
Contact
#malware analysis (2 posts)
Show all tags
2025-04-19
::
Disrupting a phishing campaign
#malware analysis
,
#reverse engineering
2025-01-22
::
Strela Stealer targeting German-Speaking Countries and Ukraine
#malware analysis
,
#reverse engineering