The LogicalTrust Expert Team
has been testing IT security for over 17 years.

We believe that the digital world can be a safe place. Therefore, we've been actively participating in projects related to security for over 17 years. We caution against digital threats at industry conferences, and for many years we've been using our blog to educate on a safer use of the Internet. We gained experience during security tests for financial, telecommunication, and governmental institutions.

Cybersecurity certificates:

We have found a series of vulnerabilities in the following products: OpenSSL, Apache, IIS, OpenSSH, BSD
and errors in products of companies such as: Facebook, Google, Apple, Microsoft, Nokia and Adobe.

We have delivered over 170 lectures on the most important industry conferences, a.o.

Hacktivity, Confidence, SECURE, Semafor, Security Bsides, Security PWNing, PLNOG, MeetIT, SecureCON, TestFest, Internet Banking Security, OWASP events, SecDay and Security Test Study, WhatTheH@ck

You can find the list of our presentations and links to materials below.

Our selected publications

Summary of 200 pentests - what to pay attention to

The Hack Summit

10.2024

Warsaw

Adam Borzymowski

10.2024

Warsaw

Adam Borzymowski

Is a toothbrush an attack vector?

Cybertrust

10.2024

Wrocław

Borys Łącki

10.2024

Wrocław

Borys Łącki

CRTP / CRTO Certificates - Testing with or without CobaltStrike?

17 53c

09.2024

Katowice

Kuba Żukowski

09.2024

Katowice

Kuba Żukowski

Summary of 100 pentests - what to look for

BSidesWarsaw2024

07.2024

Warsaw

Adam Borzymowski

07.2024

Warsaw

Adam Borzymowski

Emacs via BBS

BSidesWarsaw2024

07.2024

Warsaw

Mateusz Kocielski

07.2024

Warsaw

Mateusz Kocielski

Emacs via BBS

1753c

06.2024

Katowice

Mateusz Kocielski

06.2024

Katowice

Mateusz Kocielski

A day in the life of a pentester

17 53c

05.2024

Online

Borys Łącki

05.2024

Online

Borys Łącki

Redteaming in the back of the store

ISSA Local - Wrocław

03.2024

Wrocław

Borys Łącki

03.2024

Wrocław

Borys Łącki

No time windows is too small to be exploited

17 53c

10.2023

Katowice

Mateusz Kocielski

10.2023

Katowice

Mateusz Kocielski

Differential fuzzing 101

Oh My H@ck! 2022

12.2022

Warsaw

Łukasz Juszczyk, Mateusz Kocielski

12.2022

Warsaw

Łukasz Juszczyk, Mateusz Kocielski

Red teaming in the back of the store

Confidence 2022

06.2022

Cracow

Borys Łącki

06.2022

Cracow

Borys Łącki

Security Awareness in Polish

Webinar

11.2019

Online

Borys Łącki

11.2019

Online

Borys Łącki

8 Principles of Effective Security Awareness

Webinar

10.2019

Online

Borys Łącki

10.2019

Online

Borys Łącki

Anykernels meet fuzzing

SecurityBSides 2019

10.2019

Warsaw

Mateusz Kocielski

10.2019

Warsaw

Mateusz Kocielski

Social engineering attacks in practice

SecurityBSides 2019

10.2019

Warsaw

Borys Łącki

10.2019

Warsaw

Borys Łącki

Social engineering attacks in practice

Confidence 2019

06.2019

Cracow

Borys Łącki

06.2019

Cracow

Borys Łącki

How cybercriminals rob companies nowadays

ITCorner

05.2019

Wrocław

Borys Łącki

05.2019

Wrocław

Borys Łącki

Impulse 31337

What the Hack 2018

12.2018

Warsaw

Mateusz Kocielski

12.2018

Warsaw

Mateusz Kocielski

Spear Phishing - How to defend against it? Case Studies

SecurityBSides 2018

10.2018

Warsaw

Borys Łącki

10.2018

Warsaw

Borys Łącki

Minerva_lib

Security BSides 2018

10.2018

Warsaw

Mateusz Kocielski

10.2018

Warsaw

Mateusz Kocielski

Impulse 31337 – RCE in Quake World Server

Hacktivity

10.2018

Budapest

Mateusz Kocielski

10.2018

Budapest

Mateusz Kocielski

Spear Phishing - How to defend against it? Case Studies

Confidence 2018

04.2018

Cracow

Borys Łącki

04.2018

Cracow

Borys Łącki

Red Teaming in Poland

x33fCon

04.2017

Gdańsk

Borys Łącki

04.2017

Gdańsk

Borys Łącki

Red Teaming w Polsce

SEMAFOR

03.2017

Warsaw

Borys Łącki

03.2017

Warsaw

Borys Łącki

Security errors around us

TestFest

02.2017

Wrocław

Borys Łącki

02.2017

Wrocław

Borys Łącki

Non-Conventional Security Tests

ITCORNER

12.2016

Wrocław

Borys Łącki

12.2016

Wrocław

Borys Łącki

Make DragonflyBsd Great Again

Security BSides 2016

11.2016

Warsaw

Mateusz Kocielski

11.2016

Warsaw

Mateusz Kocielski

Critical Configuration Errors

Security PWNing Conference

11.2016

Warsaw

Borys Łącki

11.2016

Warsaw

Borys Łącki

IT Security devices and services - Full Protection or an invitation for cybercriminals?

Secure

10.2016

Warsaw

Borys Łącki

10.2016

Warsaw

Borys Łącki

DevOps/SysOps Security

Secure

10.2016

Warsaw

Borys Łącki

10.2016

Warsaw

Borys Łącki

Torturing the PHP interpreter

Confidence 2016

05.2016

Cracow

Mateusz Kocielski

05.2016

Cracow

Mateusz Kocielski

Data Leaks in Applications

Confidence | 4Developers

05.2016

Warsaw

Artur Kalinowski

05.2016

Warsaw

Artur Kalinowski

Is a systematic approach to security tests profitable?

MeetIT vol. 2

04.2016

Wrocław

Borys Łącki

04.2016

Wrocław

Borys Łącki

Information security – employee education – why we do it wrong

Semafor

04.2016

Warsaw

Borys Łącki

04.2016

Warsaw

Borys Łącki

OWASP Mobile Top Ten on the example of applications

Semafor

04.2016

Warsaw

Borys Łącki

04.2016

Warsaw

Borys Łącki

Mobile Application Security

KrakWhiteHat

2016.03

Krakow

Mateusz Kocielski

2016.03

Krakow

Mateusz Kocielski

Tools for automated testing of web application security

TestFest

02.2016

Wrocław

Borys Łącki

02.2016

Wrocław

Borys Łącki

Cybercriminals – How to defend against them?

WrocLOVE Geek Girls Carrots #28

11.2015

Wrocław

Borys Łącki

11.2015

Wrocław

Borys Łącki

BSD-licensed SASL library

EuroBSDcon 2015

10.2015

Stockholm

Mateusz Kocielski

10.2015

Stockholm

Mateusz Kocielski

Web application security tests – good practices

TestWarez

10.2015

Warsaw

Borys Łącki

10.2015

Warsaw

Borys Łącki

0xfb44f4f23139bb8a (facts and myths about pentester’s job)

Security BSIDEs 2015

10.2015

Warsaw

Mateusz Kocielski

10.2015

Warsaw

Mateusz Kocielski

Trust boundaries

Confidence

05.2015

Cracow

Mateusz Kocielski

05.2015

Cracow

Mateusz Kocielski

APT x 3 - three companies, three attack vectors, three to zero - selected case studies

Confidence

05.2015

Cracow

Borys Łącki

05.2015

Cracow

Borys Łącki

Analysis of the newest IT trends or: future problems and opportunities

Audyt bezpieczeństwa IT

04.2015

Warsaw

Borys Łącki

04.2015

Warsaw

Borys Łącki

Free tools that support the securing processes of a company infrastructure

SEMAFOR

03.2015

Warsaw

Borys Łącki

03.2015

Warsaw

Borys Łącki

OWASP Top 10 - The most popular security errors in web applications - practical examples

TestFest

02.2015

Wrocław

Borys Łącki

02.2015

Wrocław

Borys Łącki

DDoS attack - How to not lose your head on the front?

Security Case Study 2014

11.2014

Warsaw

Borys Łącki

11.2014

Warsaw

Borys Łącki

How much does DDoS costs – from the perspective of cybercriminal and attack victim

Security BSides

10.2014

Warsaw

Borys Łącki

10.2014

Warsaw

Borys Łącki

Security of Open Program Solutions of Unmanned Flying Platforms

Secure 2014

10.2014

Warsaw

Mateusz Kocielski

10.2014

Warsaw

Mateusz Kocielski

There is still one more error in every application...

Security BSides 2014

10.2014

Warsaw

Mateusz Kocielski

10.2014

Warsaw

Mateusz Kocielski

Cybercriminals and information theft - How to manage security incidents

Security Meetup

03.2014

Katowice

Borys Łącki

03.2014

Katowice

Borys Łącki

Protection against information leak - the most important aspects before, during, and after the security incident

MeetIT Vol. 8

02.2014

Katowice

Borys Łącki

02.2014

Katowice

Borys Łącki

Advanced Persistent Threat (APT) - Your defensive list

Attack and Defense

11.2013

Warsaw

Borys Łącki

11.2013

Warsaw

Borys Łącki

Trust boundaries

Security BSides 2013

10.2013

Warsaw

Mateusz Kocielski

10.2013

Warsaw

Mateusz Kocielski

Extraordinary cases from penetration tests or: the history of superiority of a superb team over automated tools

VirtualStudy

03.2013

Internet

Borys Łącki

03.2013

Internet

Borys Łącki

pwning ring0

Security BSides 2012

10.2012

Warsaw

Mateusz Kocielski

10.2012

Warsaw

Mateusz Kocielski

Simplest Ownage Human Observed… Routers

Confidence

05.2012

Cracow

Mateusz Kocielski

05.2012

Cracow

Mateusz Kocielski

Static analysis of the PHP language

OWASP

03.2012

Cracow

Mateusz Kocielski

03.2012

Cracow

Mateusz Kocielski

Advanced Persistent Threat - How organized cybercriminal groups operate

VirtualStudy

11.2011

Online

Borys Łącki

11.2011

Online

Borys Łącki

OWASP Fuzzing of PHP Interpreter

OWASP

05.2011

Krakow

Mateusz Kocielski

05.2011

Krakow

Mateusz Kocielski

Minerva - automated error searching

OWASP

05.2011

Cracow

Mateusz Kocielski

05.2011

Cracow

Mateusz Kocielski

Minor Flaws in Websites - A Real Case Study

ISSA

01.2010

Wrocław

Borys Łącki

01.2010

Wrocław

Borys Łącki

Cybercriminals of tomorrow - how much do they cost?

Seconference

04.2009

Cracow

Borys Łącki

04.2009

Cracow

Borys Łącki

A Pot of Honey in a Zombie

Pingwinaria

03.2009

Spała

Borys Łącki

03.2009

Spała

Borys Łącki

Security of community portals in terms of the Web 2.0 bugs

Pingwinaria

03.2009

Spała

Borys Łącki

03.2009

Spała

Borys Łącki

"Give Me Control of Souls, and I Will Rule the World" - A Botnet from a Network Administrator's Perspective

SecureCON

10.2006

Wrocław

Borys Łącki

10.2006

Wrocław

Borys Łącki

We invite you to contact us

through the following form:

LogicalTrust sp. z o.o.
sp. k.

Stanisławowska 47
54-611 Wrocław, Poland, EU

NIP: 8952177980
KRS: 0000713515