As an experienced security partner, we have been successfully securing your entire IT & OT for the past 20 years. We use the relevant international standards of IT and OT security and go with our 'Security Testing Process' with 5 methods far beyond classic penetration testing to identify the points of attack in your systems: Security vulnerabilities in software, firmware and microcode without them all attacks are unsuccessful. Of course, we are also available for you at any time in case of an emergency and support you in restarting your IT in a timely manner – including forensic investigations.
»We had our IGW / 922 VPN remote access gateway router tested by the IT security experts of softScheck, using both penetration testing and the fuzzing of specific network interfaces. We would like to thank softScheck for their excellent work and will continue to rely on them in the future.«
»The experienced consultants of softScheck have given us valuable impulses for the architecture and design of our Java applications by implementing a threat modeling as well as their practical implementation within the framework of our Secure SDLC.«
»The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.«
May 15, 2023
Drones are becoming increasingly popular, but they are also vulnerable. Hackers can take control of a drone, steal its data, or even crash it. We explored possible attacks and countermeasures against civilian UAVs.
Read Article