Cyber Security Services & Training

As cyber security threats continue to evolve, so must your approach to the identification, assessment and mitigation of risk.

Our unparalleled suite of technical security services and training enable organisations to be resilient, adapt to change, provide peace of mind and stay secure.

We’re in security to prevent insecurity.

crest_banner

Technical Services

Whether your requirements involve internal network, perimeter, application, password or human element testing, we’ve got you covered.

Penetration Testing

Find out more

Our penetration testing service involves intensive manual testing to assess the security posture of your infrastructure, networks and applications.

Vulnerability Assessment

Find out more

We’ll identify the potential attack surface of your internal & external assets so you can see which areas of your organisation are most at risk.

Build Review

Find out more

We’ll assess your server, workstation and device builds, identifying flaws that could allow for elevated privileges or host compromise.

Red Team

Find out more

Red team engagements allow your organisation to benchmark your current security posture against a determined threat model.

Password Audit

Find out more

Our password audits test the resiliency of your passwords against attack, identifying the accounts most at risk of compromise.

Phishing Assessment

Find out more

We’ll identify your levels of perimeter security and awareness, helping you reduce the chances of opening the door for an attacker.

Training

Our popular Hacking and Defending training courses are taught internationally at global security conferences including Black Hat. Deeply immersive and hands-on, they will arm you with the knowledge and skills to progress.

Getting Started with Sysmon for Linux

Ever wish you could leverage the power of Sysmon to keep tabs on your Linux hosts? You asked, Microsoft Delivered. We’re going to take a sneak peek for some first impressions and initial setup.

Make sure your passwords are resilient to attack

ITWorld Canada covers our co-founder Will Hunt’s talk at SecTor – Security Education Conference in Toronto, providing some secure password guidance for a non-technical audience.

What the heck PsExec!

PsExec is a tool used for both legitimate and malicious purposes. However, as there are many variants, are you covering all your bases when it comes to detection in your environment?

In this blog we explore the IOCs of differing variants and how they can be correlated to show malicious behaviour.

Detecting Lateral Movement via WinRM Using KQL

We often get asked by our clients following an assessment how they can detect the techniques we use to compromise their networks.

In this example we use Azure Sentinel to explore the IOCs that help indicate lateral movement using WinRM.

Events

Don’t miss our upcoming events, training, talks and workshops.

Training

15/11/21 – 17/11/21

Hacking Enterprises – 2021 Edition

  • Duration: 3-days
  • Location: Virtual
  • Provider / Conference: Hack In Paris
Find out more

Training

16/11/21 – 17/11/21

Defending Enterprises

  • Duration: 2-days
  • Location: Virtual
  • Provider / Conference: DeepSec
Find out more

Training

22/11/21 – 23/11/21

Defending Enterprises

  • Duration: 2-days
  • Location: Virtual
  • Provider / Conference: HITB CyberWeek
Find out more