SERVICES
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
THREATS
Sector-based threat landscape
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Russian Federation
China
Iran
North Korea
United States
Israel
Threat actor profiles
Fancy Bear/APT28
Cozy Bear/APT29
OilRig/APT34
Charming Kitten/APT35
Lazarus/APT38
Double Dragon/APT4
Sandworm
Seaturtle
Silent Librarian
RESOURCES
Member portal
Downloads
Blogs
CyberConnect Roundtables
Events
ABOUT US
CONTACT
Managed Services:
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Professional Services:
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
Our Approach
Sector-based threat landscape
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Russian Federation
China
North Korea
Iran
United States
Israel
Threat actor profiles
Fancy Bear/APT28
Cozy Bear/APT29
OilRig/APT34
Charming Kitten/APT35
Lazarus/APT38
Double Dragon/APT41
Sandworm
Seaturtle
Silent Librarian
Resources
Member Portal
Downloads
Blogs
CyberConnect Roundtables
Events
Definitive Guide to Ransomware
Articles, News and Updates: Detection logic
REvil: the usage of legitimate remote admin tooling