Bexxo cybersecurity expert conducting an IT security audit for a Swiss SME
Network security audit and vulnerability analysis for a Swiss company
Personal data protection and IT infrastructure compliant with Swiss DSA in Switzerland
Preventive cybersecurity for Swiss SMEs

Bexxo guides Swiss SMEs towards robust, lasting and controlled cybersecurity

Bexxo supports Swiss SMEs in mastering their cybersecurity: web and network audits, pentest, anti-phishing training ? compliant with Swiss DSA (nDSG) and ISO 27001. In Switzerland, 40% of cyberattacks involve SMEs (FOCS): a good reason to structure your security. Experts since 2006.

✓ Label CyberSafe ✓ Since 2006 ✓ 250+ reviews (4.5/5) ✓ Federal clearance

Our Cybersecurity Services

Website Security

Audit cybersécurité

01 Complete audit and vulnerability detection

A Bexxo web audit is a comprehensive technical examination of the company's website: automated and manual analysis of vulnerabilities (OWASP Top 10, SQL injections, XSS, CSRF, server configuration), report classified by criticality, and prioritized action plan. Our clients fix an average of 12 to 15 vulnerabilities per engagement — with a clear remediation plan, before they could be exploited.

Protection sécurité informatique

02 Protection against attacks

Bexxo deploys protections against the most frequent attack vectors: SQL injections, XSS, CSRF, brute force and ClickJacking. These vectors account for 88% of recorded web attacks (Verizon DBIR 2025) — identifying and blocking them is enough to eliminate the vast majority of risk. Each measure is documented in the audit report with its criticality level.

Sécurisation des données

03 Data security

The nLPD (in effect since September 1, 2023) sets clear obligations for securing personal data for all Swiss companies. Bexxo supports SMEs in assessing their nLPD compliance, identifying gaps and implementing the required technical measures — fines of up to CHF 250,000 simply don't apply to our clients.

Enterprise Network Security

Audit cybersécurité

01 Network infrastructure audit and analysis

Our network audit maps all exposed attack vectors of your infrastructure, with an ISO 27001 and NIST CSF compliant report. In 2024, the Federal Office for Cybersecurity recorded 62,954 incidents in Switzerland: a good reason to know exactly where you stand.

Protection sécurité informatique

02 Global IT infrastructure protection

CVE Find, Bexxo's proprietary tool, integrates the MITRE, NVD and CISA KEV databases in real time and sends an alert as soon as a known vulnerability affects the client's systems. Without active monitoring, the average detection time for a network breach reaches 241 days (IBM Cost of a Data Breach 2025) — CVE Find reduces that to a matter of hours.

Sécurisation des données

03 Securing access and sensitive data

Bexxo audits authentication policies, assesses password strength, deploys MFA and secures administrator and VPN access. Compromised credentials are behind 22% of data breaches (Verizon DBIR 2025) — the most frequent vector, and also the easiest to fix with the right measures.

Cybersecurity Protection

Our Cybersecurity Solutions

icon

We analyze your entire IT infrastructure to identify potential flaws and improve the security of your connections, equipment, and protocols.

Learn more 
icon

We conduct an in-depth diagnosis of your website to detect vulnerabilities and strengthen its protection against cyberattacks, such as SQL injections, XSS flaws, and brute-force attacks.

Learn more 
icon

Our experts assist you in developing and optimizing your IT security policy. Together, we define a tailored strategy to secure your systems, reduce risks, and ensure your compliance with current regulations.

Learn more 
icon

We implement advanced technologies to protect your infrastructures, networks, and sensitive data. From access management to information encryption, we ensure effective protection against cyber threats.

Learn more 
Bexxo?

Why choose Bexxo?

I

Certified Expertise

CyberSafe Label certified and authorized to handle confidential data for federal institutions, our experts apply the highest security standards in the industry.

II

Personalized Support

We adapt our services to your specific needs, whether you are an SME or a large company.

III

Proactive Protection

We anticipate threats before they become a problem, thereby reducing risks and the impact of attacks.

Don't let your business be vulnerable to cyber threats. With Bexxo, secure your digital future today!
Our Latest News

Latest Thinking

Previous
Next
Our 4-step method

How we collaborate with you

Écoute et compréhension des besoins

Listening and understanding

An initial meeting (30–60 min) to identify your systems, sensitive data and legal obligations (Swiss DSA, ISO 27001). No jargon — we speak your language.

Analyse approfondie des vulnérabilités

In-depth analysis

Manual and automated analysis of your web and network systems. Duration: 3 to 10 days depending on complexity. Result: a complete vulnerability map ranked by criticality.

Correction et renforcement sécurité

Correction and reinforcement

You receive a detailed report with a prioritised action plan. Our teams can implement corrections directly or support your IT teams in the remediation process.

Surveillance continue cybersécurité

Permanent vigilance

Continuous monitoring via CVE Find, real-time alerts on new vulnerabilities affecting your systems, and regular follow-up reports.

Cybersecurity tailored to your challenges

Cyberattacks are becoming increasingly sophisticated and can have disastrous consequences for businesses: loss of critical data, reputational damage, regulatory penalties, and business interruptions. To avoid these risks, it is crucial to implement a robust and proactive cybersecurity strategy.

At Bexxo, we offer tailor-made protection solutions, adapted to your needs and compliant with the most demanding security standards, such as ISO 27001/27002 and NIST. In line with NCSC recommendations, we analyze, detect, and correct vulnerabilities in your infrastructure to ensure optimal protection.

Permanent Update

Stay ahead with the latest critical security vulnerabilities.

Previous
Next
8.4

CVE-2026-40499 - HIGH
15/04/2026

radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file.

oscommandinjectionOWSAP: A03

8.3

CVE-2026-39884 - HIGH
14/04/2026

mcp-server-kubernetes is a Model Context Protocol server for Kubernetes cluster management. Versions 3.4.0 and prior contain an argument injection vulnerability in the port_forward tool in src/tools/port_forward.ts, where a kubectl command is constructed via string concatenation with user-controlled input and then naively split on spaces before being passed to spawn(). Unlike all other tools in th...

OWSAP: A03

9.9

CVE-2026-35031 - CRITICAL
14/04/2026

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extractio...

directorytraversalOWSAP: A03OWSAP: A01

9.1

CVE-2026-34457 - CRITICAL
14/04/2026

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions prior to 7.15.2 contain a configuration-dependent authentication bypass in deployments where OAuth2 Proxy is used with an auth_request-style integration (such as nginx auth_request) and either --ping-user-agent is set or --gcp-healthchecks is enabled. In affected configurations, OAuth2 Proxy treats any re...

OWSAP: A07

8.6

CVE-2026-27290 - HIGH
14/04/2026

Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then exec...

OWSAP: A08

9.6

CVE-2026-39399 - CRITICAL
14/04/2026

NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a crafted nuspec file with malicious metadata, leading to cross package metadata injection that may result in remote code execution (RCE) and/or arbitrary blob writes due to insufficient input valida...

directorytraversalOWSAP: A03OWSAP: A01

8.8

CVE-2026-40291 - HIGH
14/04/2026

Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, an insecure direct object modification vulnerability in the PUT /api/users/{id} endpoint allows any authenticated user with ROLE_STUDENT to escalate their privileges to ROLE_ADMIN by modifying the roles field on their own user record. The API Platform security expression is_granted('EDIT', object) only verif...

priviliegemanagementauthorisationproblemOWSAP: A04OWSAP: A01

8.8

CVE-2026-35196 - HIGH
14/04/2026

Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, an OS Command Injection vulnerability exists in the main/inc/ajax/gradebook.ajax.php endpoint within the export_all_certificates action, where the course code retrieved from the session variable $_SESSION['_cid'] via api_get_course_id() is concatenated directly into a shell_exec() command string without sani...

oscommandinjectionOWSAP: A03

8.4

CVE-2026-27306 - HIGH
14/04/2026

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Attacker requires elevated privileges. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

OWSAP: A03

8.6

CVE-2026-27305 - HIGH
14/04/2026

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files and directories outside the intended access scope. Exploitation of this issue does not require user interaction.

directorytraversalOWSAP: A01

9.3

CVE-2026-27304 - CRITICAL
14/04/2026

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.

OWSAP: A03

8.6

CVE-2026-34160 - HIGH
14/04/2026

Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the PENS (Package Exchange Notification Services) plugin endpoint at public/plugin/Pens/pens.php is accessible without authentication and accepts a user-controlled package-url parameter that the server fetches using curl without filtering private or internal IP addresses, enabling unauthenticated Server-Side...

authorisationproblemssrfOWSAP: A07OWSAP: A10

8.8

CVE-2026-24893 - HIGH
14/04/2026

openITCOCKPIT is an open source monitoring tool built for different monitoring engines. openITCOCKPIT Community Edition prior to version 5.5.2 contains a command injection vulnerability that allows an authenticated user with permission to add or modify hosts to execute arbitrary OS commands on the monitoring backend. The vulnerability arises because user-controlled host attributes (specifically th...

oscommandinjectionOWSAP: A03

9.3

CVE-2026-5752 - CRITICAL
14/04/2026

Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.

8.7

CVE-2026-34617 - HIGH
14/04/2026

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could result in privilege escalation. A low-privileged attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that...

crosssitescriptingOWSAP: A03

9.3

CVE-2026-34615 - CRITICAL
14/04/2026

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Scope is changed.

OWSAP: A08

9.8

CVE-2026-33824 - CRITICAL
14/04/2026

Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network.

8.8

CVE-2026-33120 - HIGH
14/04/2026

Untrusted pointer dereference in SQL Server allows an authorized attacker to execute code over a network.

overflow

8.4

CVE-2026-33115 - HIGH
14/04/2026

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

memorycorruption

8.4

CVE-2026-33114 - HIGH
14/04/2026

Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute code locally.

overflow

Frequently asked questions about cybersecurity

Does Bexxo operate throughout Switzerland?

Yes. Based in Ins (Canton of Bern), our team supports SMEs across French-speaking Switzerland and beyond. Our audits can be conducted remotely or on-site, in French, German and English.

How does a collaboration with Bexxo work?

Our process follows 4 steps: listening to your needs, in-depth analysis of your systems, fixing and strengthening detected vulnerabilities, then continuous monitoring to anticipate new threats.

How much does an IT security audit cost?

Our packages start at CHF 1,500 (Essential) and go up to CHF 15,000 (Premium) depending on the depth of analysis. Every audit complies with ISO 27002 and NIST CSF frameworks. Request a free quote tailored to your situation.

What cybersecurity services does Bexxo offer?

Bexxo offers web and network security audits, penetration testing (pentest), cybersecurity consulting, anti-phishing training with PhishTrainer, and continuous vulnerability monitoring via CVE Find.

Why does a Swiss SME need a cybersecurity audit?

Over 40% of cyberattacks in Switzerland target SMEs. An audit identifies vulnerabilities in your systems (network, website, access) before they are exploited, and ensures compliance with ISO 27001 and the Swiss Data Protection Act (nDSG).
Yes. Based in Ins (Canton of Bern), our team supports SMEs across French-speaking Switzerland and beyond. Our audits can be conducted remotely or on-site, in French, German and English.
Our process follows 4 steps: listening to your needs, in-depth analysis of your systems, fixing and strengthening detected vulnerabilities, then continuous monitoring to anticipate new threats.
Our packages start at CHF 1,500 (Essential) and go up to CHF 15,000 (Premium) depending on the depth of analysis. Every audit complies with ISO 27002 and NIST CSF frameworks. Request a free quote tailored to your situation.
Bexxo offers web and network security audits, penetration testing (pentest), cybersecurity consulting, anti-phishing training with PhishTrainer, and continuous vulnerability monitoring via CVE Find.
Over 40% of cyberattacks in Switzerland target SMEs. An audit identifies vulnerabilities in your systems (network, website, access) before they are exploited, and ensures compliance with ISO 27001 and the Swiss Data Protection Act (nDSG).