SQUR vs Cure53 — autonomous AI pentest vs senior researcher-led pentest
Cure53 is one of the most respected pentest firms in Europe. Their senior researchers find vulnerabilities other firms don't see. Their reports are legendary. SQUR is a fundamentally different kind of product: autonomous AI testing, 24 hours, €1,995 fixed price. The two aren't substitutes — they solve different problems. Here's the honest breakdown.
The headline
| SQUR | Cure53 | |
|---|---|---|
| Methodology | Autonomous AI testing, ~5% human involvement | Senior researcher-led, 100% human |
| Pricing | €1,995 per pentest, fixed | ~€10,000–€30,000 per engagement, varies |
| Turnaround | 24 hours from start to report | 3–6 weeks per engagement |
| Cadence | Quarterly or per-release achievable | Annual is typical (capacity-constrained) |
| Strengths | Width, repeatability, audit-ready format, EU residency, predictable cost | Depth, creative attack thinking, novel vulnerability discovery, specialist scopes |
| Best for | DORA Article 24 cadence, NIS2 Article 21 evidence, recurring SME pentest mandate | High-risk audits where depth matters more than width — cryptography, runtime, browser internals, novel protocols |
| EU data residency | GCP Brussels, documented per-engagement | Berlin-based firm, EU-region engagements available |
Where Cure53 wins decisively
Cure53 isn't a competitor we're trying to displace. Their researchers have published widely on browser security, JavaScript runtime internals, novel cryptographic vulnerabilities, and supply-chain attacks. The kind of vulnerability they find — a subtle race condition in a custom OAuth flow, a parser bug that survives ten autonomous testing passes, a creative chain of low-severity issues that compose into a critical compromise — is exactly the kind of vulnerability autonomous testing tends to miss.
Pick Cure53 when:
- You're shipping novel cryptographic code. Custom protocol, custom KDF, custom encryption scheme. Wallet, secure-messaging, custodial-asset, post-quantum claim. Autonomous AI can find known crypto bugs (weak ciphers, missing HSTS, deprecated TLS); it can't yet verify whether your novel protocol survives expert adversarial analysis.
- The risk model is unusual. Browser extensions. Runtime sandboxes. Compiler pipelines. WASM modules. WebGPU shaders. Smart contracts. Embedded firmware. These are scopes where the attack surface is poorly characterised and creative human research wins.
- You're undergoing an enterprise-grade external audit (regulator-led, partnership-required, M&A-driven) where the audit firm wants to see a known senior-researcher signature on the report.
- You can absorb a 3–6 week timeline and a €10K–€30K spend per engagement, and you're optimising for absolute depth.
If you're in one of those buckets, hire Cure53. They're worth it.
Where SQUR wins
Most SMEs aren't in those buckets. The compliance-driven question is "how do I run a credible pentest annually for DORA Article 24 or NIS2 Article 21(2)(e) without spending €30K each year on a 6-week engagement?" The market answer used to be "you don't — you skip it or you cheap out on a freelancer." SQUR addresses this directly.
Pick SQUR when:
- You need a credible, audit-ready pentest report on your web app or API.
- You operate under EU compliance pressure: DORA, NIS2, GDPR, ISO 27001.
- The application is standard scope: web frontend + REST/GraphQL API + authentication + business logic + third-party integrations.
- Budget is in the €1,995–€10,000 range — not the €30,000 range.
- You need to repeat the pentest quarterly or per-release, not annually.
- EU data residency is a non-negotiable (data stays in GCP Brussels per engagement).
- You don't have a dedicated security team and need a turnkey deliverable, not a 6-week engagement to coordinate.
That's the 95% case for EU mid-market. SQUR is purpose-built for it.
The "do both" strategy
For regulated entities with both compliance pressure and high-risk components, a sensible pattern is:
- SQUR quarterly on the wide application surface. Each engagement produces a CVSS-scored report with retest column. Covers DORA Article 24 annual cadence + intermediate releases. Satisfies the "appropriate and proportionate measures" effectiveness assessment under Article 21(2)(f) of NIS2.
- Cure53 (or equivalent) annually on the high-risk subscope: authentication, payment flow, cryptographic primitives, novel business logic. Deep manual audit of the 20% of the application that holds 80% of the risk.
This is a stronger posture than either approach alone: width comes from SQUR (frequency, cost-efficiency), depth comes from senior research (creativity, novel-vulnerability discovery). The combination is what mature enterprise programs actually look like.
The innovator's dilemma observation
German traditional firms (Cure53, SySS, Secuvera) have not adopted AI-driven testing into their billable methodology as of 2026. This is rational — their business model depends on senior-consultant hours, and AI compresses the bill. They serve a market segment where the senior-consultant signature is the deliverable.
That segment is real. It's also bounded. The SME compliance-driven market that SQUR addresses is significantly larger than the senior-research market, and senior-research firms aren't structurally going to serve it at SME price points. The two markets coexist.
Common questions we hear
"My auditor wants a 'real pentest report'. Is SQUR's report 'real'?"
Yes. Every SQUR finding includes CVSS scoring, evidence artefacts (screenshots, request/response), affected assets, severity-justified narrative, and remediation guidance. The retest column documents which findings were closed. The report is suitable for direct submission as DORA Article 24 evidence. For NIS2 Article 21 submissions, the optional Evidence Package overlay maps each finding to the corresponding 21(2)(a–j) measure. We've not had a SQUR report rejected by an EU auditor.
"What if AI misses something a human would catch?"
It happens. Autonomous testing is strongest on the wide, well-characterised attack surface (OWASP Top 10, authentication, business-logic invariants, API authorization). It is weaker on creative custom logic and novel cryptographic schemes. We say this on the comparison page because pretending otherwise gets us into trouble. For high-risk scopes where novel custom logic is significant, layer Cure53 annually on top of SQUR's quarterly cadence.
"Is Cure53 ever overkill?"
For most SME web/API pentest mandates: yes. A €30K Cure53 engagement scheduled six months out is the wrong tool for an audit landing next month on a standard web app. The budget is better spent on a SQUR quarterly cadence + retests. Cure53's value emerges when the scope warrants senior research — which is a fraction of all pentest engagements.
Try the SQUR engine first
Free attack-surface scan, no signup, 15 checks in under 60 seconds. If your domain looks credible after that, the €1,995 paid pentest takes 24 hours and produces the audit-ready report.
Free attack-surface scan → 15-min consultation