Security Research Lab
You Can Trust
Expert security audits and incident analysis from a team of industrial researchers specializing in Software Systems, Cloud Servers, Blockchain Protocols, Cryptography, and Digital Asset Protection.
ISO 27001 Readiness Assessments
Gap Analysis
Comprehensive evaluation of current security posture against ISO 27001 requirements with detailed remediation roadmap.
Control Assessment
Systematic review of all 114 security controls with evidence collection and documentation support.
Implementation Support
Practical guidance on implementing missing controls and building compliant security management systems.
Security Training & Awareness
Phishing Simulation Campaigns
Realistic phishing scenarios tailored to your industry. We simulate credential harvesting, spear phishing, and pretexting attacks — then deliver per-employee reporting to identify your highest-risk users.
Security Awareness Workshops
Live and async workshops covering phishing, social engineering, password hygiene, and incident reporting. Delivered in English or German, adapted for technical and non-technical staff.
ISMS Policy Review
Review and gap analysis of your existing information security policies against ISO 27001, BSI IT-Grundschutz, NIS2, DORA, or Cyber Essentials requirements. Includes remediation recommendations and updated policy drafts.
Supported Compliance Frameworks
Recent Security Incidents
Resolv Labs Security Incident
Resolv Labs - RektTuesday, April 7, 2026Resolv Labs - Private Key Leak - Supply Chain Attack Three hundred thousand dollars walked into a protocol holding $141 million. Eighty million unbacked stablecoins walked out. The official post-mortem would later reveal a supply chain attack; the breach began not inside Resolv, but at a third-party project where a contractor had previously worked.
Russia Hacked Routers to Steal Microsoft Office Tokens
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.
Venus Protocol Rekt4
Venus Protocol - Rekt IVWednesday, March 18, 2026Venus Protocol - Supply Cap Manipulation Nine months of patience. One dismissed audit finding. And a protocol that had already absorbed $717,000 in bad debt from a donation-style exploit on its own ZKSync deployment twelve months earlier. On March 15, 2026, an attacker who had spent nine months quietly accumulating 84% of Venus Protocol's supply cap for the Thena token executed a Mango Markets-style price manipulation attack on BNB Chain, bypassing the cap entirely through a technique called a donation attack, running a recursive borrow loop against thin liquidity, and extracting $3.7 million in borrowed assets before the position imploded into $2.15 million in bad debt.
Aave Security Incident
Aave - RektFriday, March 13, 2026Aave - Liquidation - Configuration Error $27.78 million (10,938 wstETH) in healthy positions liquidated - not by a hacker, not by a market crash, by Aave's own anti-manipulation system, misfiring on the people it was built to protect.
Microsoft Patch Tuesday, March 2026 Edition
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month's Patch Tuesday.
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.
Solv Security Incident
DeFi / Crypto - $2.73 million drained from Solv's BRO vault, a callback fired before the books balanced, minting the same deposit twice across 22 loops and turning 135 BRO into 567 million, all inside a single transaction. An unaudited contract with no bug bounty coverage, losses covered by the team, attacker exited to Tornado Cash.
Security Research
CVE Pending: SIGSEGV in oggenc 1.4.3 (vorbis-tools) via Crafted WAV File
A crafted WAV file triggers a null pointer dereference / segmentation fault (SIGSEGV) in oggenc 1.4.3, crashing the encoder unconditionally. Reproducible with a single Python command. No user interaction beyond passing the file to oggenc is required. CVE requested — assignment pending.
CVE Unhandled IEEE754 Special Values in Wings3D 2.4.1 OBJ Parser
A crafted Wavefront OBJ file containing IEEE754 special float values (nan, inf, -inf) or overflow exponents (1e999) in vertex coordinate fields causes Wings3D to crash immediately on import. Root cause: the Erlang function str2float_2/2 in e3d_obj.erl (line 391) uses pattern matching with no clause for IEEE754 special value strings, raising an unhandled function_clause exception that unwinds the BEAM VM call stack and terminates the import. All unsaved user work is lost. Vendor notified: sourceforge.net/p/wings/bugs/252/
CVE : Uncontrolled Resource Consumption in Scribus 1.6.5
A crafted .sla project file with extreme numeric geometry values (PAGEWIDTH, HEIGHT, BORDERLEFT, etc.) causes Scribus to enter an infinite loop during layout containment checking, consuming 99% CPU and triggering a system-wide memory pressure cascade. No user interaction beyond opening the file is required. Root cause: geometry fields are read directly into Qt structures (QRect, QRegion) without upper or lower bounds enforcement.
CVE: Unsigned Firmware Update in Actions Semiconductor Platform
The firmware update tool (RdiskUpgrade.exe / Production.dll) for all devices using Actions Semiconductor VID 10D6 performs zero cryptographic verification before flashing firmware over USB. An attacker with physical access can permanently compromise any affected device. Covers 12 USB Product IDs across multiple consumer brands. CVE submitted to MITRE — pending assignment.
CVE-2025-65834: Buffer Overflow in Shotcut 25.10.31
Buffer overflow in Shotcut video editor's MLT Framework image processing pipeline. An attacker can trigger out-of-bounds memory access via a crafted media file. CVE assigned by MITRE.
Our Services
Smart Contract Audits
Comprehensive security analysis of blockchain smart contracts, covering re-entrancy, access control, logic errors, and economic vulnerabilities.
DeFi Security Reviews
Specialized audits for DeFi protocols including oracle manipulation, flash loan attacks, AMM vulnerabilities, and token economics.
Web Application Security
OWASP Top 10 assessments, API security testing, authentication bypass, injection attacks, and XSS vulnerabilities.
Cloud Security Audits
AWS, Azure, and GCP security assessments covering IAM, network security, data protection, and compliance.
Penetration Testing
Black-box and white-box penetration testing for web applications, APIs, and infrastructure.
Incident Analysis
Post-breach forensics, root cause analysis, and remediation guidance based on real-world attack patterns.
Security Subscription Plans
Not ready for a subscription? We offer one-time security audits starting at €2,500 for smart contracts and €3,500 for full-stack applications.
Request Custom QuoteRequest a Security Audit
Tell us about your project. We scope every engagement individually — no fixed packages, no cookie-cutter reports.
We typically respond within 24 hours with a custom quote based on your project scope and requirements.
Frequently Asked Questions
Contact Us
General inquiries, partnerships, or media requests.