Compass Security

Compass Security Offensive Defense

Compass Security Blog Offensive Defense

  • LockBit Breach: Insights From a Ransomware Group’s Internal Data
    by Andreas Arnold on October 7, 2025 at 7:00 am

    Something a bit wild happened recently: A rival of LockBit decided to hack LockBit. Or, to put this into ransomware-parlance: LockBit got a post-paid pentest. It is unclear if a ransomware negotiation took place between the two, but if it has, it was not successful. The data was leaked. Now, let’s be honest: the dataset is way too small to make any solid statistical claims. Having said that, let’s make some statistical claims!

  • Ensuring NIS2 Compliance: The Importance of Penetration Testing
    by Stephan Sekula on September 23, 2025 at 7:00 am

    The Network and Information Security Directive 2 (NIS2) is the European Union’s latest framework for strengthening cyber security resilience across critical sectors. If your organization falls within the scope of NIS2, understanding its requirements and ensuring compliance is crucial to avoiding penalties and securing your operations against cyber threats.

  • Collaborator Everywhere v2
    by Andreas Brombach on September 9, 2025 at 7:00 am

    Collaborator Everywhere is a well-known extension for Burp Suite Professional to probe and detect out-of-band pingbacks.  We developed an upgrade to the existing extension with several new exiting features. Payloads can now be edited, interactions are displayed in a separate tab and stored with the project file. This makes it easier to detect and analyze any out-of-band communication that typically occurs with SSRF or Host header vulnerabilities.

  • Taming The Three-Headed Dog -Kerberos Deep Dive Series
    by Alex Joss on September 2, 2025 at 7:00 am

    Kerberos is the default authentication protocol in on-prem Windows environments. We’re launching a 6-part YouTube series, a technical deep dive into Kerberos. We’ll break down the protocol, dissect well-known attacks, and cover defensive strategies to keep your environment secure.

  • Into the World of Passkeys: Practical Thoughts and Real-Life Use Cases
    by Cyrill Brunschwiler on August 26, 2025 at 7:00 am

    In a previous blog post, we explored the technical side of passkeys (also known as discoverable credentials or resident keys), what they are, how they work, and why they’re a strong alternative to passwords. Today, we’ll show how passkeys are used in the real world – by everyday users and security professionals alike.

  • xvulnhuntr
    by Nicolo Fornari on July 8, 2025 at 7:00 am

    In 2024 we looked at the possibility of leveraging open weights LLMs for source code analysis. The answer was clearly negative, as a small code base could easily take 200K tokens, more than any context window offered by open weights models. The table below summarizes the top LLMs by context window as of today. Context

  • Pwn2Own Ireland 2024 – Ubiquiti AI Bullet
    by Yves Bieri on June 26, 2025 at 2:00 pm

    Introduction As you may know, Compass Security participated in the 2023 edition of the Pwn2Own contest in Toronto and was able to successfully compromise the Synology BC500 camera using a remote code execution vulnerability. If you missed this, head over to the blog post here https://blog.compass-security.com/2024/03/pwn2own-toronto-2023-part-1-how-it-all-started/ Unfortunately, the same vulnerability was also identified by other

  • The Dark Side of Azure Identity & Access Management – 5 IAM & Entra ID Security Risks You Can’t Ignore
    by Benjamin Czihak on June 24, 2025 at 7:00 am

    Microsoft Azure is probably the most widely used cloud platform in Switzerland, powering businesses of all sizes, from startups to multinational companies. According the the official Microsoft page over 95% of Fortune 500 companies rely on Microsoft Azure in one form or another. With this industry-wide adoption, it has become a critical component of modern-day

  • LinkedIn for OSINT: tips and tricks
    by Ivano Somaini on June 10, 2025 at 7:00 am

    When it comes to open source intelligence (OSINT), LinkedIn is a treasure trove of information. With millions of professionals voluntarily sharing details about their careers, connections, personal achievements, or keeping up to date with what is happening in their professional sphere, the famous networking platform is not to be underestimated when it comes to OSINT.

  • Renovate – Keeping Your Updates Secure?
    by Jan Friedli on May 27, 2025 at 7:00 am

    Renovate is an OSS CLI/bot that updates your software dependencies automatically. It is usually integrated into the CI/CD process and runs on a schedule. It will create a Pull Request / Merge Request (PR/MR) to your repository with dependency updates. It can optionally auto-merge them. If you host it for several repositories or an organization, it

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.