Our Services.

  • Security Code Reviews

    The most accurate and efficient way to identify vulnerabilities. Our team reviews millions of lines of code each year, revealing tons of security defects.
    Read more →

  • Artboard 1

    Security Testing

    Our highly-experienced application security experts combine manual testing with open and commercial tools to deliver high-quality security assessments.
    Read more →

  • Artboard 1

    Agile / DevOps Security

    Security bugs can enter your software at any time. We help you to catch and prevent them early on by integrating security testing into your sprints.
    Read more →

  • Mobile / App Security

    We test and secure apps since the first banking apps were built. We know every little detail of the latest emerging threats and defenses in modern apps.
    Read more →

  • rteam

    Red Teaming

    Our highly experienced multidiscipline RED team performs a coordinated attack on your organization's digital, social and physical security. Analysing your detection and response capabilities (the Blue Team).
    Read more →

  • Artboard 1

    Security Awareness

    We provide technical application security workshops with client-specific content specifically tailored to your threats and technologies.

  • Artboard 1

    Automated Security Testing

    We integrate automated security testing into your software delivery pipeline and optimize it for your targets using open source tooling such as OWASP ZAP.
    Read more →

  • Artboard 1

    Responsible Disclosure

    We help to set up and take care of your full Responsible Disclosure process, so you don’t need to overload your internal security expert(s).
    Visit rdteam.io →

  • Threatmodeling

    You can only secure your systems when you know what your threats are. We provide you with a prioritized list of threats and security measures relevant to your application.

Our Products.

  • Banking Malware Detection

    CSD provides protection against Web and Android based (banking) malware.
    Read more →

How we work

  • 1


    During the intake (free of charge) we discuss your project and tell you more about us and our modus operandi. The main purpose is to collect all the information we need to create our proposal (plan of action).

  • 2


    You will receive our proposal, including a detailed overview of the activities, deliverables, planning and costs.

  • 3


    When the proposal is accepted, we deliver a list of all the things that need to be prepared for the testing activities.

  • 4

    Executing activities

    The scheduled security testing activities will be executed in the planned time window. During the test frequent updates of findings and progress will be shared.

  • 5

    Findings meeting

    Once all testing activities have been executed, a findings meeting will be arranged to explain, demonstrate and discuss findings, impact and fixes.

  • 6

    Final report

    The results of the assessment will be reported in detail. Each finding will consist of a description of the risk, instructions on how to reproduce and verify the finding, and a recommendation on how to resolve the finding or to mitigate the risk.

Work with us →