Cyber Security Projects: Exploring Success Stories

Posted: 2024-04-17
Written by: Agnieszka Kenig-Westphal

In today’s digital age, cyber security has ascended to become a critical component of corporate strategy. As cyber-attacks can induce substantial losses and disruptions, particularly in the financial sector where data and infrastructure security are paramount, businesses are increasingly investing in sophisticated cyber security solutions. These initiatives are not just protective measures; they are becoming core elements of strategic business planning.

For many years, Solwit has been a steadfast supporter of firms in the realm of cyber security, a commitment that has culminated in receiving the “Cyber security Excellence” award from Tech Behemoths.

Our extensive experience in developing highly regulated projects delivers undeniable value to our clients. We collaborate with companies across various sectors, with a particular affinity for the automotive industry. Our project teams are composed of both domain experts and technology specialists, enabling us to perform effectively and comprehensively. This capability makes us an exceptionally attractive partner for companies that place cyber security at the core of their operations.

Piotr Wierski, Director of Testing and Embedded, Solwit Centre of Competence

połączone urządzenia telekomunikacyjne


Penetration tests of a network device

One of the European telecommunications companies commissioned us to perform penetration testing on their new router. In collaboration with the client, our Cyber security (CS) team prepared the appropriate test environment and conducted the tests in accordance with industry standards. The router required specialized infrastructure and configuration to execute the tests properly. Our team demonstrated extensive networking, operating systems, encryption, and reverse engineering knowledge, enabling comprehensive testing despite the router’s advanced configuration.

Technologies employed included:

  • Python
  • Kali Linux
  • Linux
  • GNU compiler
  • Custom scripts


Railway sector

Locomotive Penetration Testing

The project entailed conducting penetration tests on selected locomotive subnetworks to verify their resilience against cyber-attacks. Our Cyber security (CS) team deployed specialized tools for simulating hardware attacks and performing reverse engineering on embedded software and Software Development Kits (SDKs). A broad array of security techniques was utilized, including Open Source Intelligence (OSINT), JTAG interface hacking, sniffing, and spoofing, as well as fuzzing of SPI, CAN, ETH interfaces, SDK, and reverse engineering of embedded software. Custom scripts in Python and straightforward software in C were developed to expedite the process and extract the necessary data efficiently.

Tools and selected technologies employed:

  • firmware
  • software
  • Python
  • hardware reverse engineering
  • gHidra

Software house

Support in the security assessment of cloud applications

A Polish software development company sought our support in conducting a security assessment of their cloud-based application for their new web platform. Our Cyber security team worked closely with the client, performing scans and manual testing of the web application in line with Google’s standards. We conducted Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and manual tests, meeting the compliance requirements of Google. This task required the rapid deployment of our team and the timeframe for completion was extremely short. We thrive on such challenges!

Technologies employed:

  • SAST
  • DAST
  • BurpSuite PRO
  • OWASP10 ​

kamera monitorująca


Application assessment and penetration testing

A Polish firm, a provider of global security solutions, commissioned us to perform penetration testing for their new web platform. This task necessitated close collaboration with the development team, as the web application was in its final stages of development. The testing process required our Cyber security team’s extensive knowledge of web applications and the various technologies used in their creation. The task extended beyond mere automated scanning of source code and applications; it also included manual testing and code review of selected system components.

Technologies employed:

  • BurpSuite PRO
  • OWASP10
  • Black & Grey box approach
  • Cyber Kill Chain

samochód na autostradzie


Support in the preparation of a cyber security process for embedded software

Our task was to support the cyber security team of a renowned automotive company in developing and conducting cyber security tests for their new platform. Solwit provided an expert with experience in the automotive industry and cyber security testing, filling gaps in the client team’s competencies and offering advisory support. We conducted an analysis of the system’s selected security features, carried out fuzzing tests, and prepared the approach and tools for penetration testing.

Technologies employed:

  • C
  • Kali Linux
  • vTESTstudio
  • CANoe

Standards: ISO 21434:2021 and ISO 24089:2023​


Intelligent systems

Preparing for CSMS and SUMS implementation – cyber security compliance assessment

Our client is a global leader in providing intelligent lithium-ion-based power systems. Before implementing cyber security management systems and software updates, we conducted a baseline audit. Our cyber security team, composed of three specialists, tailored their expertise to meet the industry’s needs. The cyber security analysis resulted in a comprehensive report summarizing the strengths and weaknesses of the company’s security processes.


  • ISO 21434:2021
  • ISO 24089:2023​

online shopping

Online store

Strengthening cyber security in e-commerce

Unauthorized content modifications were detected in a client’s online store, raising suspicions of a security breach. A rapid analysis was commissioned, along with a root cause analysis (RCA) and an enhancement of security measures. The Cyber security team investigated the web service using external tools. A suspected breach was ruled out, and a particular plugin was identified as the main cause. A report from the penetration tests was provided to the client, and issues of high criticality were resolved within three business days.

Selected technologies:

  • BurpSuite PRO
  • wpscan
  • CVSS
  • OpenVAS
  • OWASP10

gospodarka odpadami

Waste Management

Improving the security lifecycle of web applications

A waste management service provider requested a security assessment of their new application, which is based on microservices and hosted in a public cloud. Adhering to industry standards, within the agreed budget and timeline, our Cyber security team conducted tests for the web application. Two types of penetration tests were performed: black-box tests for external attack scenarios and gray-box tests for internal ones. The gray-box scans focused on detecting and potentially exploiting vulnerabilities present in open-source libraries, using two different tools for scanning containers and dependencies.

Selected technologies and methodologies

  • BurpSuite PRO
  • Black & Grey box approach
  • Cloudflare
  • Rapid7 InsightVM
  • Kali Linux tools

źródła odnawialne

Energy Management

Infrastructure assessment and penetration testing

The client requested a security review of their flagship product in the pre-production phase to evaluate the application before its deployment in a municipal office in Europe. Black-box penetration tests were proposed for the building management system.

Selected technologies and methodologies:

  • BurpSuite PRO
  • OWASP10
  • OpenVAS
  • Kali Linux tools
  • Black box approach​

rozwój oprogramowania

IT Development

Securing automotive software against external cyber-attacks

Our client required support from experienced C++ developers with robust skills in computer networking. Leveraging our expertise in both the automotive industry and in cyber security for safety-critical systems, we were tasked with developing a segment of software for detecting incidents that could escalate into dangerous or critical situations. Working at the network layer, we were responsible for developing the initial set of security features in a multi-layered system consisting of numerous sensors.


  • C++
  • TCP/IP
  • Linux​​

Are you seeking a technology partner to perform a cyber security audit for you? Or maybe you need an expert consultation? Get in touch and enhance your company’s security. 

Written by: Agnieszka Kenig-Westphal,
Digital Marketing Manager

Digital Marketing Manager at Solwit. With over 11 years of experience in marketing, she has collaborated with both corporations and fast-growing companies in the new technology sector. Privately, she is a travel enthusiast and organizer, as well as a lover of topics related to futurology.

the form below.
We will contact you to set up
a conversation at the convenient
moment for you.