Search for:
Careers
Contact
Home
SERVICES
Cybersecurity Assesments
Cyber Red Teaming & Threat Emulation
Penetration Testing
Vulnerability Assessments
Risk & Security Control Assessments
Defensive Cyber Operations (DCO)
Network Security Monitoring & Intrusion Detection / Prevention
Threat Hunting & Network Forensics
Incident Response
Security Orchestration, Automation, & Response
Cyber Research & Development
Big Data Engineering & Automation
Additive Manufacturing Cyber Defense
Cyber Threat Intelligence
Data Analytics & Visualization
Home
Services
Cybersecurity Assesments
Cyber Red Teaming & Threat Emulation
Penetration Testing
Vulnerability Assessments
Risk & Security Control Assessments
View All
Defensive Cyber Operations (DCO)
Network Security Monitoring & Intrusion Detection / Prevention
Threat Hunting & Network Forensics
Incident Response
Security Orchestration, Automation, & Response
View All
Cyber Research & Development
Big Data Engineering & Automation
Additive Manufacturing Cyber Defense
Cyber Threat Intelligence
Data Analytics & Visualization
View All
About
About Us
OUR TEAM
PAST PERFORMANCE
Government
Government
Contract Vehicles
Resources
Blog
close
LATEST NEWS
< BLOG / >
Showing 1–20 of 66 results
Log4j: The Gift That Keeps on Giving (Shells)
**Update 15 December 2021: Updated guidance for Log4j updates/upgrades can be found here. Christmas came early for some hackers while [...]
READ MORE ›
Tracking An Effective Ransomware Campaign – Part 3
The more things change, the more they stay the same. Ransomware attacks continue to disrupt organizations across all sectors while [...]
READ MORE ›
Tracking An Effective Ransomware Campaign – Part 2
Since our last post at the end of August 2021, we have continued to track an effective ransomware group and [...]
READ MORE ›
Cobalt Strike and Ransomware – Tracking An Effective Ransomware Campaign
During the course of multiple incident response engagements, we encountered a persistent, unknown ransomware threat group utilizing an obfuscated Golang [...]
READ MORE ›
Augmenting a Django QuerySet
The Django 2.1 ORM is quite capable. Though it does not cover every conceivable use case, it handles nearly all [...]
READ MORE ›
Tips for Improving Vulnerability Management
BreakPoint Labs is excited to share some tips and tricks for improving vulnerability management programs. Our goal is to help [...]
READ MORE ›
Adding Pentest Sauce to your Vulnerability Management Recipe
One question we get after performing a penetration test is “Why didn’t I see some of these vulnerabilities during our [...]
READ MORE ›
Bsides Philly 2016: Finding A Company’s BreakPoint
BSides Philly is an information security conference that’s a volunteer organized event, hosted by and for the community, with a [...]
READ MORE ›
Beyond Automated Tools
< Overview > This talk is all about how to go beyond automated tools to hunt for vulnerabilities. I discuss [...]
READ MORE ›
Next Level Reconnaissance with Shodan and Censys
During the initial phases of a penetration test, online resources such as Shodan can serve as a starting point to [...]
READ MORE ›
RECENT
Cybersecurity Concerns for Ancillary Strength Control Subsystems
AM Botnet as a Vector for Energy Market Manipulation
Building Trust in AI Manufacturing Systems with BISON
Proactive Defense: Preparing for Cyber Threats in Additive Manufacturing
Prints, Piracy, and Protection: Safeguarding 3D IP
1
2
3
…
17
Next »
Archives
October 2023
August 2023
July 2023
April 2023
March 2023
February 2023
January 2023
November 2022
September 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
August 2021
December 2019
November 2019
October 2019
September 2019
March 2018
December 2017
November 2017
August 2017
February 2017
October 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION
Contact
First Name
Email
Phone/Mobile
Subject
Subject
SUBMIT
search
envelope-o
close
linkedin-square
bars
chevron-down