Search for:
Careers
Contact
Home
SERVICES
Cybersecurity Assesments
Cyber Red Teaming & Threat Emulation
Penetration Testing
Vulnerability Assessments
Risk & Security Control Assessments
Defensive Cyber Operations (DCO)
Network Security Monitoring & Intrusion Detection / Prevention
Threat Hunting & Network Forensics
Incident Response
Security Orchestration, Automation, & Response
Cyber Research & Development
Big Data Engineering & Automation
Additive Manufacturing Cyber Defense
Cyber Threat Intelligence
Data Analytics & Visualization
Home
Services
Cybersecurity Assesments
Cyber Red Teaming & Threat Emulation
Penetration Testing
Vulnerability Assessments
Risk & Security Control Assessments
View All
Defensive Cyber Operations (DCO)
Network Security Monitoring & Intrusion Detection / Prevention
Threat Hunting & Network Forensics
Incident Response
Security Orchestration, Automation, & Response
View All
Cyber Research & Development
Big Data Engineering & Automation
Additive Manufacturing Cyber Defense
Cyber Threat Intelligence
Data Analytics & Visualization
View All
About
About Us
OUR TEAM
PAST PERFORMANCE
Government
Government
Contract Vehicles
Resources
Blog
close
LATEST NEWS
< BLOG / >
Showing 1–20 of 66 results
Using Python to Decrypt Dispind.A and Helminth HTTP Beacons
Microsoft’s Windows Defender Advanced Threat Hunting Team and Palo Alto’s Unit 42 recently published some great technical writes up that [...]
READ MORE ›
ImageMagick Undocumented Feature – RCE (CVE-2016-3714)
Overview: This past week a very interesting vulnerability (CVE-2016-3714) came out affecting ImageMagick – software used to convert, edit, and [...]
READ MORE ›
Beyond Automated Tools
< Overview > This talk is all about how to go beyond automated tools to hunt for vulnerabilities. I discuss [...]
READ MORE ›
How to Start Your InfoSec Career
Overview: This webcast is hosted by Andrew, Luke, and Zack and we discuss tips and tricks for starting your InfoSec [...]
READ MORE ›
Use the X-Forwarded-For Header, Luke: Joomla RCE CVE-2015-8562
Summary: A recent vulnerability in Joomla (CVE-2015-8562) has been patched after reports of exploitation occurring in the wild impacting all [...]
READ MORE ›
Next Level Reconnaissance with Shodan and Censys
During the initial phases of a penetration test, online resources such as Shodan can serve as a starting point to [...]
READ MORE ›
Detecting and Understanding Emdivi HTTP C2
Detecting sophisticated cyber threats is an inherently difficult task. Understanding what systems and information may have been compromised can be [...]
READ MORE ›
RECENT
Cybersecurity Concerns for Ancillary Strength Control Subsystems
AM Botnet as a Vector for Energy Market Manipulation
Building Trust in AI Manufacturing Systems with BISON
Proactive Defense: Preparing for Cyber Threats in Additive Manufacturing
Prints, Piracy, and Protection: Safeguarding 3D IP
1
2
3
…
17
Next »
Archives
October 2023
August 2023
July 2023
April 2023
March 2023
February 2023
January 2023
November 2022
September 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
August 2021
December 2019
November 2019
October 2019
September 2019
March 2018
December 2017
November 2017
August 2017
February 2017
October 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION
Contact
First Name
Email
Phone/Mobile
Subject
Subject
SUBMIT
search
envelope-o
close
linkedin-square
bars
chevron-down