Security Testing of IT/OT/IoT/SCADA. Verification of security for both infrastructure and applications including web, mobile and client-server.
Red teaming & social engineering
Real-life attack simulations starting from technical aspects, social engineering to physical security. We perform Advanced Persistent Threat (APT) simulations.
Security Audits & Vulnerability Scans
Audits covering broad scope, including procedures, software architecture, source code audits, configuration reviews and vulnerability assessment.
threat hunting & threat intelligence
Searching for active cyber threats, proactive digital forensics aimed for detecting attackers in the organisation. Service delivered as a form of constant monitoring and as a last line of SOC.
Digital forensics & incident response
Criminal forensics: securing digital evidence, analysing traces of activity, digital forensics, log analysis, events, RAM analysis. Additionally secure data removal.
Research & development
Wide experience in identifying security vulnerabilities in popular software. We are able to conduct targeted security research for both software and IT/OT/IoT devices.