References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

Private Bank

Scenario-based red teaming attacks agains a custody platform for crypto currencies

Tool Manufacturer

Unauthenticated lateral movement pentest performed in an SAP environment

Airport Operator

Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network

Cantonal Bank

Red Teaming: comprehensive attack simulation from the perspective of an external attacker with the goal to gain access using social engineering attacks and further infiltrate the internal network

Service and Production Company

Red Teaming Assessment with OSINT collection, phishing emails, analysis of the internal attack surface and search for critical vulnerabilities as well as lateral movement in the internal network

Bank

Security Review of the Active Directory

Tool Manufacturer

Red teaming and architecture review with the goal of compromising the backup infrastructure and testing its resilience against a targeted attack

Retailer

Security audit of several aspects of a system landscape through WLAN auditing, a penetration test of the cash registers, an architecture review and social hacking as well as conducting an attack simulation

Energy Provider

Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network

Bank

Red Teaming: comprehensive attack simulation from the perspective of a compromised employee as well as an attacker with access to the internal network

Energy Provider

Red Teaming: comprehensive attack simulation from the perspective of a compromised employee as well as an attacker with access to the internal network

Cantonal Administration

Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network

Supplier of Coating Equipment

Comprehensive penetration test including wardriving, WLAN audit and Red Teaming; The network infrastructure was examined by means of a remote and internal security scan, a Wardriving and WLAN-Audit at one location and a Red Teaming

Electric Supply Company

Comprehensive audit of a network control environment, incl. technical tests of servers and devices in a substation, analysis of network traffic and review of the firewall rules

IT Service Provider

Awareness trainings for IT managers and simulation of a phishing campaign over 30 companies

Media Group

Simulation and analysis of a phishing campaign across the entire workforce

Insurance Group

Red Teaming: Comprehensive attack simulation to check the implemented protective measures and the employee reaction

Insurance Company

Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network

Financial Service Provider

Red Teaming: Comprehensive attack simulation to check the implemented protective measures and the employee reaction

IT Company

Red Teaming from the point of view of a through phishing compromised employee as well as an attacker in the internal network

Cantonal Bank

Red Teaming: comprehensive attack simulation to evaluate the implemented protection measures as well as the reactivity of the SOC and physical social engineering at two locations

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts