Menu

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

To help contain the damages that arise from the log4j vulnerability, Code Intelligence...

On December 9th, 2021, the Remote Code Execution (RCE) CVE-2021-44228 in Apache log4j 2 was...

How Continental Tested 18 000 LoC in Only One Week The HMI Business Unit at Continental...

Just a few weeks ago, we published Jazzer, our coverage-guided fuzzing engine for the Java...

Get an overview of our testing platform by watching our demo video. 

 

Watch CI Fuzz Demo

 

At Code Intelligence we already fixed thousands of bugs with our fuzzing engine for the JVM. Now...

If you or your team are working on projects in Java or C/C++, then I have great news for you:...

This year our annual fuzzing event went into the second round, as we hosted FuzzCon Europe 2020....

Innovation and growth in software development have sparked a number of new approaches. Agile,...

The IT security company from Bonn will accelerate the development of its software testing...

Since the outbreak of the COVID-19 pandemic, tracing apps have been discussed in order to better...

Executive Summary Software developers extend their existing frameworks and often write new...

Our vulnerability researcher Sirko Höer recently found vulnerabilities while fuzzing the...

Das Bonner Cyber Security Startup Code Intelligence GmbH ist Teil des TechBoost Startup-Programm...

Subscribe to our Newsletter!