Grey Wolf Security

Grey Wolf Security

Comments

Cyberattackers had unfettered access to the technology giant’s file server for four months.

Consumer electronics giant Panasonic’s data breach raises questions, researchers say – given that more than two weeks after the incident was discovered, it’s unclear if customers’ personal information has been impacted.

By Tara Seals - threatpost
#greywolfsec #technology #data #consumerelectronics #cybersecurity #computersecurity #databreach #databreaches #panasonic
DNA Diagnostics Center (DDC), an Ohio-based DNA testing company, has disclosed a hacking incident that affects 2,102,436 persons.

The incident resulted in a confirmed data breach that occurred between May 24, 2021, and July 28, 2021, and the firm concluded its internal investigation on October 29, 2021.

By Bill Toulas - Bleeping Computer
#greywolfsec #data #hacking #cybersecurity #ddc #dna #databreach #databreaches
Malware campaigns distributing Android trojans that steals online bank credentials have infected almost 300,000 devices through malicious apps pushed via Google's Play Store.

The Android banking trojans delivered onto compromised devices attempt to steal users' credentials when they log in to an online banking or cryptocurrency apps. Credential theft is commonly done using fake bank login form overlays displayed on top of the legitimate apps' login screens.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #google #cryptocurrency #android #malware #banking #bank
A recently discovered botnet is attacking unpatched AT&T enterprise network edge devices using exploits for a four-year-old critical severity Blind Command Injection security flaw.

The botnet, dubbed EwDoor by researchers at Qihoo 360's Network Security Research Lab (360 Netlab), targets AT&T customers using EdgeMarc Enterprise Session Border Controller (ESBC) edge devices.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #networksecurity #att #edgemarc #qihoo #botnet #bots #esbc
Researchers analyzed the security of four popular smartwatches for children and found pre-installed downloaders, weak passwords, and unencrypted data transmissions.

The analysis demonstrates that most of these devices arbitrarily collect and periodically transmit sensitive data to remote servers without the user knowing about it.

By Bill Toulas - Bleeping Computer
#greywolfsec #security #data #cybersecurity #smartwatches
Some security researchers say it’s actually Cobalt Strike and not a SmokeLoader variant, but BioBright says in-depth testing shows it’s for real a scary morphic malware that changes its parts and recompiles itself.

An APT has attacked two separate vaccine manufacturers this year using a shape-shifting malware that appears at first to be a ransomware attack but later shows to be far more sophisticated, researchers have found.

By Elizabeth Montalbano - threatpost
#greywolfsec #malware #cybersecurity #apt #biobright #cobaltstrike #vaccines #ransomware
A temporary fix has been issued for CVE-2021-24084, which can be exploited using the LPE exploitation approach for the HiveNightmare/SeriousSAM bug.

An unpatched Windows security vulnerability could allow information disclosure and local privilege escalation (LPE), researchers have warned. The issue (CVE-2021-24084) has yet to get an official fix, making it a zero-day bug – but a micropatch has been rolled out as a stop-gap measure.

By Tara Seals - threatpost
#greywolfsec #security #windows #cybersecurity #zeroday #0day #hivenightmare #serioussam #cve #micropatch #microsoft
Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients.

The new feature is currently available only for desktop Zoom clients on Windows and macOS, with the Linux platform not currently supported.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #macos #windows #zoom
Cannazon, one of the largest dark web marketplaces for buying ma*****na products, shut down last week after suffering a debilitating distributed denial of service attack.

As the admins explained in a message signed with the market's PGP key, they are officially retiring and claim not to be pulling an exit scam on their vendors.

By Bill Toulas - Bleeping Computer
#greywolfsec #cyber #cybersecurity #darkweb #tor #cannazon #pgp #ddosattack #ddos
Security researchers have discovered a new remote access trojan (RAT) for Linux that keeps an almost invisible profile by hiding in tasks scheduled for ex*****on on a non-existent day, February 31st.

Dubbed CronRAT, the malware is currently targeting web stores and enables attackers to steal credit card data by deploying online payment skimmers on Linux servers.

By Ionut Ilascu - Bleeping Computer
#greywolfsec #security #malware #data #linux
Marine services giant Swire Pacific Offshore (SPO) has suffered a Clop ransomware attack that allowed threat actors to steal company data.

Swire Pacific Offshore discovered an unauthorized network infiltration onto its IT systems, resulting in the compromise of some employee data.

By Bill Toulas - Bleeping Computer
#greywolfsec #data #network #offshore #marine #ransomeware
The TrickBot malware operators have been using a new method to check the screen resolution of a victim system to evade detection of security software and analysis by researchers.

Last year, the TrickBot gang added a new feature to their malware that terminated the infection chain if a device was using non-standard screen resolutions of 800x600 and 1024x768.

By Ionut Ilascu - Bleeping Computer
#greywolfsec #security #software #malware #cybersecurity

Grey Wolf Security specializes in cyber security solutions. We deliver subject matter experts to your project and ready to secure your critical infrastructure.

Let’s defend your enterprise today! HUBZone certified firm.

Operating as usual

Panasonic’s Data Breach Leaves Open Questions 11/30/2021

Panasonic’s Data Breach Leaves Open Questions

Cyberattackers had unfettered access to the technology giant’s file server for four months.

Consumer electronics giant Panasonic’s data breach raises questions, researchers say – given that more than two weeks after the incident was discovered, it’s unclear if customers’ personal information has been impacted.

By Tara Seals - threatpost
#greywolfsec #technology #data #consumerelectronics #cybersecurity #computersecurity #databreach #databreaches #panasonic

Panasonic’s Data Breach Leaves Open Questions Cyberattackers had unfettered access to the technology giant's file server for four months.

DNA testing firm discloses data breach affecting 2.1 million people 11/30/2021

DNA testing firm discloses data breach affecting 2.1 million people

DNA Diagnostics Center (DDC), an Ohio-based DNA testing company, has disclosed a hacking incident that affects 2,102,436 persons.

The incident resulted in a confirmed data breach that occurred between May 24, 2021, and July 28, 2021, and the firm concluded its internal investigation on October 29, 2021.

By Bill Toulas - Bleeping Computer
#greywolfsec #data #hacking #cybersecurity #ddc #dna #databreach #databreaches

DNA testing firm discloses data breach affecting 2.1 million people DNA Diagnostics Center (DDC), an Ohio-based DNA testing company, has disclosed a hacking incident that affects 2,102,436 persons.

Android banking malware infects 300,000 Google Play users 11/30/2021

Android banking malware infects 300,000 Google Play users

Malware campaigns distributing Android trojans that steals online bank credentials have infected almost 300,000 devices through malicious apps pushed via Google's Play Store.

The Android banking trojans delivered onto compromised devices attempt to steal users' credentials when they log in to an online banking or cryptocurrency apps. Credential theft is commonly done using fake bank login form overlays displayed on top of the legitimate apps' login screens.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #google #cryptocurrency #android #malware #banking #bank

Android banking malware infects 300,000 Google Play users Malware campaigns distributing Android trojans that steals online bank credentials have infected almost 300,000 devices through malicious apps pushed via Google's Play Store.

EwDoor botnet targets AT&T network edge devices at US firms 11/30/2021

EwDoor botnet targets AT&T network edge devices at US firms

A recently discovered botnet is attacking unpatched AT&T enterprise network edge devices using exploits for a four-year-old critical severity Blind Command Injection security flaw.

The botnet, dubbed EwDoor by researchers at Qihoo 360's Network Security Research Lab (360 Netlab), targets AT&T customers using EdgeMarc Enterprise Session Border Controller (ESBC) edge devices.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #networksecurity #att #edgemarc #qihoo #botnet #bots #esbc

EwDoor botnet targets AT&T network edge devices at US firms A recently discovered botnet is attacking unpatched AT&T enterprise network edge devices using exploits for a four-year-old critical severity Blind Command Injection security flaw.

Smartwatches for children are a privacy and security nightmare 11/30/2021

Smartwatches for children are a privacy and security nightmare

Researchers analyzed the security of four popular smartwatches for children and found pre-installed downloaders, weak passwords, and unencrypted data transmissions.

The analysis demonstrates that most of these devices arbitrarily collect and periodically transmit sensitive data to remote servers without the user knowing about it.

By Bill Toulas - Bleeping Computer
#greywolfsec #security #data #cybersecurity #smartwatches

Smartwatches for children are a privacy and security nightmare Researchers analyzed the security of four popular smartwatches for children and found pre-installed downloaders, weak passwords, and unencrypted data transmissions.

Shape-Shifting ‘Tardigrade’ Malware Hits Vaccine Makers 11/29/2021

Shape-Shifting ‘Tardigrade’ Malware Hits Vaccine Makers

Some security researchers say it’s actually Cobalt Strike and not a SmokeLoader variant, but BioBright says in-depth testing shows it’s for real a scary morphic malware that changes its parts and recompiles itself.

An APT has attacked two separate vaccine manufacturers this year using a shape-shifting malware that appears at first to be a ransomware attack but later shows to be far more sophisticated, researchers have found.

By Elizabeth Montalbano - threatpost
#greywolfsec #malware #cybersecurity #apt #biobright #cobaltstrike #vaccines #ransomware

Shape-Shifting ‘Tardigrade’ Malware Hits Vaccine Makers Some security researchers say it’s actually Cobalt Strike and not a SmokeLoader variant, but BioBright says in-depth testing shows it’s for real a scary morphic malware that changes its parts and recompiles itself.

Unpatched Windows Zero-Day Allows Privileged File Access 11/29/2021

Unpatched Windows Zero-Day Allows Privileged File Access

A temporary fix has been issued for CVE-2021-24084, which can be exploited using the LPE exploitation approach for the HiveNightmare/SeriousSAM bug.

An unpatched Windows security vulnerability could allow information disclosure and local privilege escalation (LPE), researchers have warned. The issue (CVE-2021-24084) has yet to get an official fix, making it a zero-day bug – but a micropatch has been rolled out as a stop-gap measure.

By Tara Seals - threatpost
#greywolfsec #security #windows #cybersecurity #zeroday #0day #hivenightmare #serioussam #cve #micropatch #microsoft

Unpatched Windows Zero-Day Allows Privileged File Access A temporary fix has been issued for CVE-2021-24084, which can be exploited using the LPE exploitation approach for the HiveNightmare/SeriousSAM bug.

Zoom finally adds automatic updates to Windows, macOS clients 11/29/2021

Zoom finally adds automatic updates to Windows, macOS clients

Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients.

The new feature is currently available only for desktop Zoom clients on Windows and macOS, with the Linux platform not currently supported.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #macos #windows #zoom

Zoom finally adds automatic updates to Windows, macOS clients Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients.

Dark web market Cannazon shuts down after massive DDoS attack 11/29/2021

Dark web market Cannazon shuts down after massive DDoS attack

Cannazon, one of the largest dark web marketplaces for buying ma*****na products, shut down last week after suffering a debilitating distributed denial of service attack.

As the admins explained in a message signed with the market's PGP key, they are officially retiring and claim not to be pulling an exit scam on their vendors.

By Bill Toulas - Bleeping Computer
#greywolfsec #cyber #cybersecurity #darkweb #tor #cannazon #pgp #ddosattack #ddos

Dark web market Cannazon shuts down after massive DDoS attack Cannazon, one of the largest dark web marketplaces for buying ma*****na products, shut down last week after suffering a debilitating distributed denial of service attack.

New Linux malware hides in cron jobs with invalid dates 11/26/2021

New Linux malware hides in cron jobs with invalid dates

Security researchers have discovered a new remote access trojan (RAT) for Linux that keeps an almost invisible profile by hiding in tasks scheduled for ex*****on on a non-existent day, February 31st.

Dubbed CronRAT, the malware is currently targeting web stores and enables attackers to steal credit card data by deploying online payment skimmers on Linux servers.

By Ionut Ilascu - Bleeping Computer
#greywolfsec #security #malware #data #linux

New Linux malware hides in cron jobs with invalid dates Security researchers have discovered a new remote access trojan (RAT) for Linux that keeps an almost invisible profile by hiding in tasks scheduled for ex*****on on a non-existent day, February 31st.

Marine services giant Swire Pacific Offshore hit by ransomware 11/26/2021

Marine services giant Swire Pacific Offshore hit by ransomware

Marine services giant Swire Pacific Offshore (SPO) has suffered a Clop ransomware attack that allowed threat actors to steal company data.

Swire Pacific Offshore discovered an unauthorized network infiltration onto its IT systems, resulting in the compromise of some employee data.

By Bill Toulas - Bleeping Computer
#greywolfsec #data #network #offshore #marine #ransomeware

Marine services giant Swire Pacific Offshore hit by ransomware Swire Pacific Offshore (SPO) has discovered an unauthorized network infiltration onto its IT systems, resulting in the compromise of some employee data.

TrickBot phishing checks screen resolution to evade researchers 11/26/2021

TrickBot phishing checks screen resolution to evade researchers

The TrickBot malware operators have been using a new method to check the screen resolution of a victim system to evade detection of security software and analysis by researchers.

Last year, the TrickBot gang added a new feature to their malware that terminated the infection chain if a device was using non-standard screen resolutions of 800x600 and 1024x768.

By Ionut Ilascu - Bleeping Computer
#greywolfsec #security #software #malware #cybersecurity

TrickBot phishing checks screen resolution to evade researchers The TrickBot malware operators have been using a new method to check the screen resolution of a victim system to evade detection of security software and analysis by researchers.

IKEA email systems hit by ongoing cyberattack 11/26/2021

IKEA email systems hit by ongoing cyberattack

IKEA is battling an ongoing cyberattack where threat actors are targeting employees in internal phishing attacks using stolen reply-chain emails.

A reply-chain email attack is when threat actors steal legitimate corporate email and then reply to them with links to malicious documents that install malware on recipients' devices.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #cyberattack #malware #email

IKEA email systems hit by ongoing cyberattack IKEA is battling an ongoing cyberattack where threat actors are targeting employees in internal phishing attacks using stolen reply-chain emails.

FBI: Online shoppers risk losing over $53M to holiday scams 11/24/2021

FBI: Online shoppers risk losing over $53M to holiday scams

The Federal Bureau of Investigation (FBI) warned today that online shoppers risk losing more than $53 million during this year's holiday season to scams promising bargains and hard-to-find gifts.

"During the 2020 holiday shopping season, the FBI Internet Crime Complaint Center (IC3) received over 17,000 complaints regarding the non-delivery of goods, resulting in losses over $53 million," the federal law enforcement agency said in a public service announcement issued through the Internet Crime Complaint Center.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #fbi #cybersecurity #ic3 #scam #scammers #holidayscam

FBI: Online shoppers risk losing over $53M to holiday scams The Federal Bureau of Investigation (FBI) warned today that online shoppers risk losing more than $53 million during this year's holiday season to scams promising bargains and hard-to-find gifts.

Stealthy new JavaScript malware infects Windows PCs with RATs 11/24/2021

Stealthy new JavaScript malware infects Windows PCs with RATs

A new stealthy JavaScript loader named RATDispenser is being used to infect devices with a variety of remote access trojans (RATs) in phishing attacks.

The novel loader was quick to establish distribution partnerships with at least eight malware families, all designed to steal information and give actors control over the target devices.

By Bill Toulas - Bleeping Computer
#greywolfsec #malware #javascript #partnerships #cybersecurity

Stealthy new JavaScript malware infects Windows PCs with RATs A new stealthy JavaScript malware loader named RATDispenser is being used to infect devices with a variety of remote access trojans (RATs) in phishing attacks.

GoDaddy Breach Widens to Include Reseller Subsidiaries 11/24/2021

GoDaddy Breach Widens to Include Reseller Subsidiaries

Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen.

The GoDaddy breach affecting 1.2 million customers has widened – it turns out that various subsidiaries that resell GoDaddy Managed WordPress were also affected.

By Tara Seals - threatpost
#greywolfsec #wordpress #cyber #cybersecurity #breach #godaddy

GoDaddy Breach Widens to Include Reseller Subsidiaries Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen.

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker 11/24/2021

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker

Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought by Facebook subsidiary WhatsApp, Apple is adding significant weight to the company’s woes.

In the wake of a zero-click zero-day exploit that was deployed against iPhone users, Apple has filed a lawsuit against NSO Group.

By Tara Seals - threatpost
#greywolfsec #facebook #iphone #cybersecurity #pegasus #pegasusspyware #nsogroup #nso #0day #zeroday #apple #whatsapp

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought by Facebook subsidiary WhatsApp, Apple is adding significant weight to the company's woes.

Hackers exploit Microsoft MSHTML bug to steal Google, Instagram creds 11/24/2021

Hackers exploit Microsoft MSHTML bug to steal Google, Instagram creds

A newly discovered Iranian threat actor is stealing Google and Instagram credentials belonging to Farsi-speaking targets worldwide using a new PowerShell-based stealer dubbed PowerShortShell by security researchers at SafeBreach Labs.

The info stealer is also used for Telegram surveillance and collecting system information from compromised devices that get sent to attacker-controlled servers together with the stolen credentials.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #security #google #instagram #cybersecurity #iran #powershell #telegram #surveillance #powershortshell #farsi #safebreach

Hackers exploit Microsoft MSHTML bug to steal Google, Instagram creds A newly discovered Iranian threat actor is stealing Google and Instagram credentials belonging to Farsi-speaking targets worldwide using a new PowerShell-based stealer dubbed PowerShortShell by security researchers at SafeBreach Labs.

Tardigrade hackers target big pharma vaccine makers with stealthy malware 11/23/2021

Tardigrade hackers target big pharma vaccine makers with stealthy malware

An advanced hacking group known as 'Tardigrade' is targeting biomanufacturing facilities and research centers working on vaccines and critical medicines.

The actor uses sophisticated custom malware to spread in compromised networks and exfiltrates data for extensive periods without being noticed.

By Bill Toulas - Bleeping Computer
#greywolfsec #data #malware #hacking #research #vaccine #vaccines #vaccinedevelopment #vaccineresearch

Tardigrade hackers target big pharma vaccine makers with stealthy malware ​An advanced hacking group known as 'Tardigrade' is targeting biomanufacturing facilities and research centers working on vaccines and critical medicines.

Apple sues spyware-maker NSO Group, notifies iOS exploit targets 11/23/2021

Apple sues spyware-maker NSO Group, notifies iOS exploit targets

Apple has filed a lawsuit against Pegasus spyware-maker NSO Group and its parent company for the targeting and spying of Apple users with surveillance tech.

The company says the state-sponsored attacks that used NSO's spyware only targeted "a very small number" of individuals, across multiple platforms, including iOS and Android.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #tech #android #ios #surveillance #cybersecurity #apple #nso #spyware

Apple sues spyware-maker NSO Group, notifies iOS exploit targets Apple has filed a lawsuit against Pegasus spyware-maker NSO Group and its parent company for the targeting and spying of Apple users with surveillance tech.

FBI warns of phishing targeting high-profile brands' customers 11/23/2021

FBI warns of phishing targeting high-profile brands' customers

The Federal Bureau of Investigation (FBI) warned today of recently detected spear-phishing email campaigns targeting customers of "brand-name companies" in attacks known as brand phishing.

This warning was issued as a public service announcement through the bureau's Internet Crime Complaint Center platform in coordination with DHS' Cybersecurity and Infrastructure Security Agency (CISA).

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #cybersecurity #security #infrastructure #email #brand #fbi #cisa #dhs #doj

FBI warns of phishing targeting high-profile brands' customers The Federal Bureau of Investigation (FBI) warned today of recently detected spear-phishing email campaigns targeting customers of "brand-name companies" in attacks known as brand phishing.

GoDaddy’s Latest Breach Affects 1.2M Customers 11/23/2021

GoDaddy’s Latest Breach Affects 1.2M Customers

The kingpin domain registrar has logged its fifth cyber-incident since 2018, after an attacker with a compromised password stole email addresses, SSH keys and database logins.

Web-hosting giant GoDaddy has confirmed another data breach, this time affecting at least 1.2 million of its customers.

By Tara Seals - threatpost
#greywolfsec #data #cyber #email #database #cybersecurity #godaddy #godaddybreach

GoDaddy’s Latest Breach Affects 1.2M Customers The kingpin domain registrar has logged its fifth cyber-incident since 2018, after an attacker with a compromised password stole email addresses, SSH keys and database logins.

Imunify360 Bug Leaves Linux Web Servers Open to Code Ex*****on, Takeover 11/22/2021

Imunify360 Bug Leaves Linux Web Servers Open to Code Ex*****on, Takeover

CloudLinux’s security platform for Linux-based websites and web servers contains a high-severity PHP deserialization bug.

A high-severity security vulnerability in CloudLinux’s Imunify360 cybersecurity platform could lead to arbitrary code ex*****on and web-server takeover, according to researchers.

By Tara Seals - threatpost
#greywolfsec #cybersecurity #security #linux #php #cloudlinux #imunify360

Imunify360 Bug Leaves Linux Web Servers Open to Code Ex*****on, Takeover CloudLinux’s security platform for Linux-based websites and web servers contains a high-severity PHP deserialization bug.

Category

Products

Continuous Monitoring
We use the latest technology to detect compliance and risk issues associated with an organization’s operational environment.

Cloud Security
Also known as cloud computing security, we use a combination of policies, procedures and technical controls to secure your data. Our cloud experts stay current with the latest technology and best practices.

Digital Forensics
We identify, collect, analyze, and report on valuable digital information related to computer crimes.

Firewall Engineering
We design, build, and manage the security infrastructure of IT systems. This includes firewalls, and Virtual Private Networks (VPNs) for your organization.

IDS/IPS Engineering
We implement Intrusion Detection Systems (IDS) to monitor network traffic for suspicious activity. We can fine tune these systems to reduce false positives so that your analysts are not chasing bad leads while missing the real threats. Intrusion Prevention Systems (IPS) can be configured to halt attacks before they reach your network.

Incident Response
We will help define and execute a plan to handle security incidents, breaches, and cyber threats. A carefully defined plan mitigates the chance of damage or loss during a cyber-attack, and lowers the chance of having another one in the future.

Pe*******on Testing
We offer pe*******on testing, or “pen testing” or “ethical hacking,” to test your applications, networks and systems. This service allows for simulation of real-world hacking attempts. Incident response functions can be tested as well as technical defenses.

Risk Assessment
This is an evaluation to determine what cyber factors are working against your mission. We can determine points of entry and help you mitigate these risks to an acceptable level.

Security Analysis
We evaluate network and host activity on a continuous basis using the latest technology and techniques. All areas of your infrastructure are examined to ensure risks are mitigated appropriately.

Security Architecture and Design
We help you design secure solutions around your current or new infrastructure.

Security Implementation
We can create and implement security features for your mission so you don’t have to. We bring in experts to protect all areas of your organization.

Security Operations and Maintenance
We monitor, upgrade, and maintain your existing cyber systems and tools.

Security Project Management
Our seasoned professionals leverage their experience to ensure your complex security requirements are met and your project progresses on schedule.

SIEM Engineering
Security Information and Event Management software services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security threats of applications and network hardware. Our experts can configure these systems to maximize visibility inside your networks and hosts while preserving your existing technology investments.

SOC Management
The management of a security operation is a critical task. We have capable staff with a proven track record of leading security operations across the federal and private sectors.

Software Assurance
Our staff will review your already created code for vulnerabilities. If you bring us on early in the design phase, we can help you create and deploy code that is secure from the start.

Threat Intelligence
We employ tradecraft that allow us to gather information about threats facing your organization. This knowledge is then used to build out use cases. These use cases allow us to tailor your defensive posture and stay prepared in an ever-changing threat landscape.

Vulnerability Assessment and Analysis
We provide a detailed analysis and summary of vulnerabilities against your critical assets. We can also help you assess which parts of your infrastructure are most important which helps in positioning defenses.

Telephone

Address


161 Fort Evans Rd NE STE 250
Leesburg, VA
20176

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Friday 9am - 5pm
Other Business Services in Leesburg (show all)
KMR Club Lambs KMR Club Lambs
14354 Loyalty Rd.
Leesburg, 20176

Welcome to KMR Club Lambs! Our mission has been to raise and sell banner-winning lambs for middle of the class prices. Join the KMR Club Lambs Crew and experience success wherever you show

Record Nations Record Nations
Leesburg, 20176

Helping business of all sizes go paperless. We specialize in bulk digitizing. The goal is a document management system that saves you time and money.

Northern Virginia Fire Rescue Leadership Development Institute "NVFR LDI" Northern Virginia Fire Rescue Leadership Development Institute "NVFR LDI"
18980 Upper Belmont Pl
Leesburg, 20176

Northern Virginia Fire & Rescue Leadership Development Institute (NVFR LDI) Offers Premier Learning Targeted at Advancing the Region's Elite Officers.

Capital Computers & Networks Capital Computers & Networks
64 Sycolin Rd SE
Leesburg, 20175

IT Service, hardware and software for Small Business.

Four Tech Solutions Four Tech Solutions
204 Grafton Way NE
Leesburg, 20176

Web Design - Website Build & Website Upgrades - Website Maintenance - Marketing Services including SEO & Email Marketing (Electronic Newsletter Service) - Special Technical Services - Math Tutor

Loudoun Business Women Loudoun Business Women
WaverlyPark Mansion 604 S King Street 2nd Floor
Leesburg, 20175

We are a networking vehicle for professional business women in Loudoun County VA looking to grow their own personal brand. We meet the 2nd Saturday 8am of each month.

Handi Bobby Handi Bobby
Leesburg, 20175

Restoration & Handy Man Services 571-309-7173 http:/www.HandiBobby.com

RNC Construction Group LLC. RNC Construction Group LLC.
Leesburg, 20177

We offer affordable and friendly service in Northern Virginia and Maryland. At RNC Construction Group, LLC we take great pride in our quality of work.

4.10 Photography 4.10 Photography
19019 Upper Belmont Place
Leesburg, 20176

Knikki Ruffin Knikki Ruffin
9 Catoctin Circle Southwest.
Leesburg, 20175

Professional hair services in northern Virginia

Washington Information Source Co. Washington Information Source Co.
Leesburg, 20175

Providing FDA, EU regulatory news, analysis and documents since 1991.

Always Best Care Loudoun Always Best Care Loudoun
44084 Riverside Parkway, Ste. LL325
Leesburg, 20176

Always Best Care Senior Services provides senior care in Loudoun County, including the communities of Purcellville, Ashburn, Hamilton and many more.