Tested Technologies

Tested Technologies

We have experience not only with the latest industrial technologies.

Data leaks from employees, customers, company know-how, or disabling production can have a serious impact on your business and reputation. In addition to testing, we also offer consulting and security monitoring services.
tested technology

Advanced Penetration Testing

Are you using machine learning, artificial intelligence, large language models? We help you uncover their vulnerabilities. We find and exploit weaknesses in your AI systems to make them robust against potential threats.

Red Teaming for AI

We simulate sophisticated cyberattacks targeted at AI technologies to verify the resilience of your systems and find security weaknesses. We will help you confront, manage and overcome risks such as Deep Fake, Prompt Injection, Model Stealing, Adversarial Attacks and others.

AI Audits

We conduct in-depth audits to ensure that your AI tools comply with the best practices such as the OWASP LLM AI Cybersecurity & Governance Checklist as well as necessary regulations.

We test the vulnerabilities of your cloud instance, network security, data security, identity and access management, privilege escalation, protection against attacks, backup – recovery of data, compliance and regulations. We also test related cloud services.

We perform configuration audits and security assessments, especially for AWS, Microsoft Azure, Google Cloud Platform (GCP), VMware, and others. 

Web applications are among the most common targets of our ethical hackers as well as real attackers. Security is often overlooked during the development of web applications, their deployment into production, or after upgrading functionalities. Unaddressed vulnerabilities can have fatal consequences for the functionality and security of web applications and your business.

When testing web applications, it is equally important to test the back-end and APIs of connected services as it is to test the front-end of the application itself. We will look for known vulnerabilities according to the OWASP methodology, as well as logic errors (login, checkout, etc.). We use the latest tools supplemented by expert assessments from our hackers.

Do you have a mobile application that handles personal data? Do you work with financial transactions, or want to verify the quality of the application code from a security perspective? We will perform a penetration test according to the OWASP Mobile Security Testing Guide methodology.

If you operate your own servers and network infrastructure, we recommend that you perform regular penetration tests. Data leaks of employees, customers, or know-how can have serious consequences for your business operations and reputation.

During an internal infrastructure test, we simulate an attack conducted from the internal environment of your network, for example, from the perspective of an employee with standard user privileges without additional knowledge of the internal infrastructure or deployed applications. 

An external infrastructure test is conducted from the outside, simulating an attack from the Internet on publicly available IP addresses.

In addition to typical IT infrastructure, we focus on IoT and Embedded devices, their communication and web services. IoT and Embedded devices are now deployed in homes, businesses and industries, but the security risks associated with them are greatly underestimated.

Citadelo Company Logo

Are you interested in boosting your company’s security?

Book a free 15 min. consultation call with us to find out how we can help you do that.

Book now

logo

Sign up for our newsletter for all the important cybersecurity and ethical hacking news.

Home

GDPR

Contacts

Code of ethics

News

© 2024 citadelo AG. All rights reserved.

facebooklinkedinxyoutube