Bexxo cybersecurity expert conducting an IT security audit for a Swiss SME
Network security audit and vulnerability analysis for a Swiss company
Personal data protection and IT infrastructure compliant with Swiss DSA in Switzerland
Preventive cybersecurity for Swiss SMEs

Bexxo guides Swiss SMEs towards robust, lasting and controlled cybersecurity

Bexxo supports Swiss SMEs in mastering their cybersecurity: web and network audits, pentest, anti-phishing training ? compliant with Swiss DSA (nDSG) and ISO 27001. In Switzerland, 40% of cyberattacks involve SMEs (FOCS): a good reason to structure your security. Experts since 2006.

✓ Label CyberSafe ✓ Since 2006 ✓ 250+ reviews (4.5/5) ✓ Federal clearance

Our Cybersecurity Services

Website Security

Audit cybersécurité

01 Complete audit and vulnerability detection

A Bexxo web audit is a comprehensive technical examination of the company's website: automated and manual analysis of vulnerabilities (OWASP Top 10, SQL injections, XSS, CSRF, server configuration), report classified by criticality, and prioritized action plan. Our clients fix an average of 12 to 15 vulnerabilities per engagement — with a clear remediation plan, before they could be exploited.

Protection sécurité informatique

02 Protection against attacks

Bexxo deploys protections against the most frequent attack vectors: SQL injections, XSS, CSRF, brute force and ClickJacking. These vectors account for 88% of recorded web attacks (Verizon DBIR 2025) — identifying and blocking them is enough to eliminate the vast majority of risk. Each measure is documented in the audit report with its criticality level.

Sécurisation des données

03 Data security

The nLPD (in effect since September 1, 2023) sets clear obligations for securing personal data for all Swiss companies. Bexxo supports SMEs in assessing their nLPD compliance, identifying gaps and implementing the required technical measures — fines of up to CHF 250,000 simply don't apply to our clients.

Enterprise Network Security

Audit cybersécurité

01 Network infrastructure audit and analysis

Our network audit maps all exposed attack vectors of your infrastructure, with an ISO 27001 and NIST CSF compliant report. In 2024, the Federal Office for Cybersecurity recorded 62,954 incidents in Switzerland: a good reason to know exactly where you stand.

Protection sécurité informatique

02 Global IT infrastructure protection

CVE Find, Bexxo's proprietary tool, integrates the MITRE, NVD and CISA KEV databases in real time and sends an alert as soon as a known vulnerability affects the client's systems. Without active monitoring, the average detection time for a network breach reaches 241 days (IBM Cost of a Data Breach 2025) — CVE Find reduces that to a matter of hours.

Sécurisation des données

03 Securing access and sensitive data

Bexxo audits authentication policies, assesses password strength, deploys MFA and secures administrator and VPN access. Compromised credentials are behind 22% of data breaches (Verizon DBIR 2025) — the most frequent vector, and also the easiest to fix with the right measures.

Cybersecurity Protection

Our Cybersecurity Solutions

icon

We analyze your entire IT infrastructure to identify potential flaws and improve the security of your connections, equipment, and protocols.

Learn more 
icon

We conduct an in-depth diagnosis of your website to detect vulnerabilities and strengthen its protection against cyberattacks, such as SQL injections, XSS flaws, and brute-force attacks.

Learn more 
icon

Our experts assist you in developing and optimizing your IT security policy. Together, we define a tailored strategy to secure your systems, reduce risks, and ensure your compliance with current regulations.

Learn more 
icon

We implement advanced technologies to protect your infrastructures, networks, and sensitive data. From access management to information encryption, we ensure effective protection against cyber threats.

Learn more 
Bexxo?

Why choose Bexxo?

I

Certified Expertise

CyberSafe Label certified and authorized to handle confidential data for federal institutions, our experts apply the highest security standards in the industry.

II

Personalized Support

We adapt our services to your specific needs, whether you are an SME or a large company.

III

Proactive Protection

We anticipate threats before they become a problem, thereby reducing risks and the impact of attacks.

Don't let your business be vulnerable to cyber threats. With Bexxo, secure your digital future today!
Our Latest News

Latest Thinking

Previous
Next
Our 4-step method

How we collaborate with you

Écoute et compréhension des besoins

Listening and understanding

An initial meeting (30–60 min) to identify your systems, sensitive data and legal obligations (Swiss DSA, ISO 27001). No jargon — we speak your language.

Analyse approfondie des vulnérabilités

In-depth analysis

Manual and automated analysis of your web and network systems. Duration: 3 to 10 days depending on complexity. Result: a complete vulnerability map ranked by criticality.

Correction et renforcement sécurité

Correction and reinforcement

You receive a detailed report with a prioritised action plan. Our teams can implement corrections directly or support your IT teams in the remediation process.

Surveillance continue cybersécurité

Permanent vigilance

Continuous monitoring via CVE Find, real-time alerts on new vulnerabilities affecting your systems, and regular follow-up reports.

Cybersecurity tailored to your challenges

Cyberattacks are becoming increasingly sophisticated and can have disastrous consequences for businesses: loss of critical data, reputational damage, regulatory penalties, and business interruptions. To avoid these risks, it is crucial to implement a robust and proactive cybersecurity strategy.

At Bexxo, we offer tailor-made protection solutions, adapted to your needs and compliant with the most demanding security standards, such as ISO 27001/27002 and NIST. In line with NCSC recommendations, we analyze, detect, and correct vulnerabilities in your infrastructure to ensure optimal protection.

Permanent Update

Stay ahead with the latest critical security vulnerabilities.

Previous
Next
8.8

CVE-2026-6186 - HIGH
13/04/2026

A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

overflow

8.8

CVE-2026-33858 - HIGH
13/04/2026

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which resolves this issue.

OWSAP: A08

8.8

CVE-2026-1462 - HIGH
13/04/2026

A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due ...

OWSAP: A08

8.5

CVE-2026-6204 - HIGH
13/04/2026

LibreNMS versions before 26.3.0 are affected by an authenticated remote code execution vulnerability by abusing the Binary Locations config and the Netcommand feature. Successful exploitation requires administrative privileges. Exploitation could result in compromise of the underlying web server.

oscommandinjectionOWSAP: A03

8.8

CVE-2026-35337 - HIGH
13/04/2026

Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted seriali...

OWSAP: A08

9.3

CVE-2026-4810 - CRITICAL
13/04/2026

A Code Injection and Missing Authentication vulnerability in Google Agent Development Kit (ADK) versions 1.7.0 (and 2.0.0a1) through 1.28.1 (and 2.0.0a2) on Python (OSS), Cloud Run, and GKE allows an unauthenticated remote attacker to execute arbitrary code on the server hosting the ADK instance. This vulnerability was patched in versions 1.28.1 and 2.0.0a2. Customers need to redeploy the upgra...

authorisationproblemOWSAP: A07

8.8

CVE-2026-6168 - HIGH
13/04/2026

A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

overflow

9.1

CVE-2026-5085 - CRITICAL
13/04/2026

Solstice::Session versions through 1440 for Perl generates session ids insecurely. The _generateSessionID method returns an MD5 digest seeded by the epoch time, a random hash reference, a call to the built-in rand() function and the process id. The same method is used in the _generateID method in Solstice::Subsession, which is part of the same distribution. The epoch time may be guessed, if it ...

OWSAP: A02

8.6

CVE-2026-3830 - HIGH
13/04/2026

The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks

sqlinjectionOWSAP: A03

8.5

CVE-2026-5936 - HIGH
13/04/2026

An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations. This behavior may be exploited to probe internal network services, access otherwise unreachable endpoints (e.g., cloud metadata services), or bypass network access controls, potentially leading to sensitive information disclosure and further compromise o...

ssrfOWSAP: A10

9.8

CVE-2026-6156 - CRITICAL
13/04/2026

A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

commandinjectionoscommandinjectionOWSAP: A03

9.8

CVE-2026-6155 - CRITICAL
13/04/2026

A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted element is the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument pppoeServiceName can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.

commandinjectionoscommandinjectionOWSAP: A03

9.8

CVE-2026-6154 - CRITICAL
13/04/2026

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

commandinjectionoscommandinjectionOWSAP: A03

8.7

CVE-2026-6157 - HIGH
13/04/2026

A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impacts the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument apcliSsid results in buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

overflow

9.8

CVE-2026-6140 - CRITICAL
13/04/2026

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

commandinjectionoscommandinjectionOWSAP: A03

9.8

CVE-2026-6139 - CRITICAL
13/04/2026

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

commandinjectionoscommandinjectionOWSAP: A03

9.3

CVE-2026-6138 - CRITICAL
13/04/2026

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used.

oscommandinjectioncommandinjectionOWSAP: A03

8.7

CVE-2026-6137 - HIGH
12/04/2026

A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

overflow

8.7

CVE-2026-6136 - HIGH
12/04/2026

A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

overflow

8.7

CVE-2026-6135 - HIGH
12/04/2026

A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

overflow

Frequently asked questions about cybersecurity

Does Bexxo operate throughout Switzerland?

Yes. Based in Ins (Canton of Bern), our team supports SMEs across French-speaking Switzerland and beyond. Our audits can be conducted remotely or on-site, in French, German and English.

How does a collaboration with Bexxo work?

Our process follows 4 steps: listening to your needs, in-depth analysis of your systems, fixing and strengthening detected vulnerabilities, then continuous monitoring to anticipate new threats.

How much does an IT security audit cost?

Our packages start at CHF 1,500 (Essential) and go up to CHF 15,000 (Premium) depending on the depth of analysis. Every audit complies with ISO 27002 and NIST CSF frameworks. Request a free quote tailored to your situation.

What cybersecurity services does Bexxo offer?

Bexxo offers web and network security audits, penetration testing (pentest), cybersecurity consulting, anti-phishing training with PhishTrainer, and continuous vulnerability monitoring via CVE Find.

Why does a Swiss SME need a cybersecurity audit?

Over 40% of cyberattacks in Switzerland target SMEs. An audit identifies vulnerabilities in your systems (network, website, access) before they are exploited, and ensures compliance with ISO 27001 and the Swiss Data Protection Act (nDSG).
Yes. Based in Ins (Canton of Bern), our team supports SMEs across French-speaking Switzerland and beyond. Our audits can be conducted remotely or on-site, in French, German and English.
Our process follows 4 steps: listening to your needs, in-depth analysis of your systems, fixing and strengthening detected vulnerabilities, then continuous monitoring to anticipate new threats.
Our packages start at CHF 1,500 (Essential) and go up to CHF 15,000 (Premium) depending on the depth of analysis. Every audit complies with ISO 27002 and NIST CSF frameworks. Request a free quote tailored to your situation.
Bexxo offers web and network security audits, penetration testing (pentest), cybersecurity consulting, anti-phishing training with PhishTrainer, and continuous vulnerability monitoring via CVE Find.
Over 40% of cyberattacks in Switzerland target SMEs. An audit identifies vulnerabilities in your systems (network, website, access) before they are exploited, and ensures compliance with ISO 27001 and the Swiss Data Protection Act (nDSG).