25.02.2026
2 minutes
softScheck sheds light on the often-overlooked OT security risk surrounding the PROFINET mechanism ‘Reset to Factory’ and shows how it can be abused without authentication to deliberately disrupt industrial systems.
19.03.2025
2 minutes
softScheck proudly announces the open-source release of scans2any, a powerful tool for merging and formatting network scan results.
15.10.2024
2 minutes
Short overview of our recent contributions to open-source security tools.
15.05.2023
11 minutes
Drones are becoming increasingly popular, but they are also vulnerable. Hackers can take control of a drone, steal its data, or even crash it. We explored possible attacks and countermeasures against civilian UAVs.
21.07.2022
3 minutes
During a security test at one of our customers, we came across a web application with integrated helpdesk software. In this context, we identified a critical zero-day vulnerability in Zammad's software. This existed because Zammad did not …
15.12.2021
4 minutes
On November 24th a critical vulnerability in Log4j was reported to Apache. It was later made public under the name Log4Shell (CVE-2021-44228); it can be exploited effortlessly remotely and allows an attacker to execute his own code (RCE). …
09.06.2020
4 minutes
ILIAS is a free and open source learning platform which can be used to create and distribute web-based teaching and learning materials. It is often used by universities and companies for e-learning. This blog post describes how we …
25.04.2019
10 minutes
Netatmo Welcome is a smart camera, which is capable of recognizing faces, streaming recordings into the cloud or alerting the owner in case of a burglary. As part of ongoing research into the Internet of Things security, we continued our …
20.09.2018
8 minutes
Netatmo Welcome is a smart camera, which is capable of recognizing faces, streaming recordings into the cloud or alerting the owner in case of a burglary. As part of ongoing research into the Internet of Things security, we performed static …
01.09.2017
9 minutes
We analyzed a recent wave of phishing mails trying to spread the Emotet banking trojan via malicious Word documents. This post provides details of the obfuscation methods used in the VBA macro and the PowerShell script contained within the …