Grey Wolf Security

Grey Wolf Security

Comments

A new watering hole attack has been discovered targeting macOS users and visitors of a pro-democracy radio station website in Hong Kong and infecting them with the DazzleSpy malware.

As detailed by researchers at ESET who have been investigating the campaign, it's part of the same operation that Google's Project Zero disclosed two weeks ago, which leveraged Chrome and Windows zero-days to hack into Windows and Android devices.

By Bill Toulas - Bleeping Computer
#greywolfsec #google #android #malware #windows #exploit #vulnerability #projectzero #macos #dazzlespy #malwareanalysis #hongkong #eset #securityresearch
Google is rolling out new warning banners in Google Drive to alert users of potentially suspicious files that threat actors could use for malware delivery and in phishing attacks.

This extra defense against abusive behavior and content was first announced in October during the Google Cloud Next 2021 user conference.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #googlecloud #google #malware #content #cyber #cybersecurity #googleapps #googledrive #technology #phishingattacks #phishingalert #phishing #usersecurity
A critical security bug and a months-long, ongoing supply-chain attack spell trouble for WordPress users.

The WordPress content management system (CMS) is offering admins more headaches this week, thanks to a pair of disparate but concerning security problems in add-ons for the platform.

By Tara Seals - threatpost
#greywolfsec #wordpress #content #cyber #cybersecurity #contentmanagement #cms #supplychainsecurity #supplychain #adsanity #accesspress #openscads #wordpressplugins #greywolfsec #security #management #wordpress #content #cyber #cybersecurity
The Federal Bureau of Investigation (FBI) warned Americans this week that cybercriminals are using maliciously crafted Quick Response (QR) codes to steal their credentials and financial info.

The warning was issued as a public service announcement (PSA) published on the Bureau's Internet Crime Complaint Center (IC3) earlier this week.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #psa #ic3 #cyber #cybersecurity #doj #fbi #qrcode #qr #cybercrime #cybercrimeawareness
Two security vulnerabilities that impact the Control Web Panel (CWP) software can be chained by unauthenticated attackers to gain remote code ex*****on (RCE) as root on vulnerable Linux servers.

CWP, previously known as CentOS Web Panel, is a free Linux control panel for managing dedicated web hosting servers and virtual private servers.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #security #softwaresecurity #software #linux #cwp #webhosting #webhostingservices #webhostingprovider #vps #vpshosting #centos
This week, the Cybersecurity and Infrastructure Security Agency (CISA) added seventeen actively exploited vulnerabilities to the 'Known Exploited Vulnerabilities Catalog.

The 'Known Exploited Vulnerabilities Catalog' is a list of vulnerabilities that have been seen abused by threat actors in attacks and that are required to be patched by Federal Civilian Executive Branch (FCEB) agencies.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #cybersecurity #dhs #cisa #vulnerabilities #vulnerabilitycatalog #fceb #federalgovernment #usa
McAfee Enterprise (now rebranded as Trellix) has patched a security vulnerability discovered in the company's McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges.

McAfee Agent is a client-side component of McAfee ePolicy Orchestrator (McAfee ePO) that downloads and enforces endpoint policies and deploys antivirus signatures, upgrades, patches, and new products on enterprise endpoints.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #security #software #windows #cyber #cybersecurity #mcafee #mcafeeenterprise #epo #hbss #microsoft
Microsoft has announced that Excel 4.0 (XLM) macros will now be disabled by default to protect customers from malicious documents.

In October, the company first revealed in a Microsoft 365 message center update that it would disable XLM macros in all tenants if the users or admins hadn't manually toggled the feature on or off.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #microsoft #excel #cyber #cybersecurity #office365 #o365 #o365security #macros #macrosecurity #xlm #malware #malwareattacks
McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code ex*****on with SYSTEM privileges.

McAfee has patched two high-severity vulnerabilities in a component of its McAfee Enterprise product that attackers can use to escalate privileges, including up to SYSTEM.

By Lisa Vaas - threatpost
#greywolfsec #mcafee #cybersecurity #cyber #antivirus #antivirussoftware #microsoft #windows #exploit #vulnerability #securitybug
A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim's devices.

Fortinet discovered the new campaign after spotting phishing emails impersonating Maersk Shipping, a giant in the global shipping industry, and using seemingly legitimate email addresses.

By Bill Toulas - Bleeping Computer
#greywolfsec #emailsecurity #shipping #phishingemails #cyber #cybersecurity #maesrkshipping #maesrk #maesrkline #supplychain #shippingindustry #fortinet #strrat #rat #remoteaccestrojan #phishing #scammers #malwareattacks #malware
President Joe Biden signed a national security memorandum (NSM) on Wednesday to increase the security of national security systems part of critical US government networks used in military and intelligence activities when storing or transferring classified info.

"Modernizing our cybersecurity defenses and protecting all federal networks is a priority for the Biden Administration, and this National Security Memorandum raises the bar for the cybersecurity of our most sensitive systems," the White House said.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #cybersecurity #nationalsecurity #intelligence #whitehouse #nationaldefense #cyberdefense #nsm #nationalsecuritymemorandum
The WordPress WP HTML Mail plugin, installed in over 20,000 sites, is vulnerable to a high-severity flaw that can lead to code injection and the distribution of convincing phishing emails.

'WP HTML Mail' is a plugin used for designing custom emails, contact form notifications, and generally tailored messages that online platforms send to their audience.

By Bill Toulas - Bleeping Computer
#greywolfsec #wordpress #html #cybersecurity #vulnerability #vulnerabilitymanagement #phishing #wphtmlmail #wpplugin #codeinjection #wpflaw #pluginflaw

Grey Wolf Security specializes in cyber security solutions. We deliver subject matter experts to your project and ready to secure your critical infrastructure.

Let’s defend your enterprise today! HUBZone certified firm.

Operating as usual

New DazzleSpy malware targets macOS users in watering hole attack 01/25/2022

New DazzleSpy malware targets macOS users in watering hole attack

A new watering hole attack has been discovered targeting macOS users and visitors of a pro-democracy radio station website in Hong Kong and infecting them with the DazzleSpy malware.

As detailed by researchers at ESET who have been investigating the campaign, it's part of the same operation that Google's Project Zero disclosed two weeks ago, which leveraged Chrome and Windows zero-days to hack into Windows and Android devices.

By Bill Toulas - Bleeping Computer
#greywolfsec #google #android #malware #windows #exploit #vulnerability #projectzero #macos #dazzlespy #malwareanalysis #hongkong #eset #securityresearch

New DazzleSpy malware targets macOS users in watering hole attack A new watering hole attack has been discovered targeting macOS users and visitors of a pro-democracy radio station website in Hong Kong and infecting them with the DazzleSpy malware

Google Drive now warns you of suspicious phishing, malware docs 01/25/2022

Google Drive now warns you of suspicious phishing, malware docs

Google is rolling out new warning banners in Google Drive to alert users of potentially suspicious files that threat actors could use for malware delivery and in phishing attacks.

This extra defense against abusive behavior and content was first announced in October during the Google Cloud Next 2021 user conference.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #googlecloud #google #malware #content #cyber #cybersecurity #googleapps #googledrive #technology #phishingattacks #phishingalert #phishing #usersecurity

Google Drive now warns you of suspicious phishing, malware docs Google is rolling out new warning banners in Google Drive to alert users of potentially suspicious files that threat actors could use for malware delivery and in phishing attacks.

AdSanity, AccessPress Plugins Open Scads of WordPress Sites to Takeover 01/25/2022

AdSanity, AccessPress Plugins Open Scads of WordPress Sites to Takeover

A critical security bug and a months-long, ongoing supply-chain attack spell trouble for WordPress users.

The WordPress content management system (CMS) is offering admins more headaches this week, thanks to a pair of disparate but concerning security problems in add-ons for the platform.

By Tara Seals - threatpost
#greywolfsec #wordpress #content #cyber #cybersecurity #contentmanagement #cms #supplychainsecurity #supplychain #adsanity #accesspress #openscads #wordpressplugins #greywolfsec #security #management #wordpress #content #cyber #cybersecurity

AdSanity, AccessPress Plugins Open Scads of WordPress Sites to Takeover A critical security bug and a months-long, ongoing supply-chain attack spell trouble for WordPress users.

FBI warns of malicious QR codes used to steal your money 01/24/2022

FBI warns of malicious QR codes used to steal your money

The Federal Bureau of Investigation (FBI) warned Americans this week that cybercriminals are using maliciously crafted Quick Response (QR) codes to steal their credentials and financial info.

The warning was issued as a public service announcement (PSA) published on the Bureau's Internet Crime Complaint Center (IC3) earlier this week.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #psa #ic3 #cyber #cybersecurity #doj #fbi #qrcode #qr #cybercrime #cybercrimeawareness

FBI warns of malicious QR codes used to steal your money The Federal Bureau of Investigation (FBI) warned Americans this week that cybercriminals are using maliciously crafted Quick Response (QR) codes to steal their credentials and financial info.

CWP bugs allow code ex*****on as root on Linux servers, patch now 01/24/2022

CWP bugs allow code ex*****on as root on Linux servers, patch now

Two security vulnerabilities that impact the Control Web Panel (CWP) software can be chained by unauthenticated attackers to gain remote code ex*****on (RCE) as root on vulnerable Linux servers.

CWP, previously known as CentOS Web Panel, is a free Linux control panel for managing dedicated web hosting servers and virtual private servers.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #security #softwaresecurity #software #linux #cwp #webhosting #webhostingservices #webhostingprovider #vps #vpshosting #centos

CWP bugs allow code ex*****on as root on Linux servers, patch now Two security vulnerabilities that impact the Control Web Panel (CWP) software can be chained by unauthenticated attackers to gain remote code ex*****on (RCE) as root on vulnerable Linux servers.

CISA adds 17 vulnerabilities to list of bugs exploited in attacks 01/24/2022

CISA adds 17 vulnerabilities to list of bugs exploited in attacks

This week, the Cybersecurity and Infrastructure Security Agency (CISA) added seventeen actively exploited vulnerabilities to the 'Known Exploited Vulnerabilities Catalog.

The 'Known Exploited Vulnerabilities Catalog' is a list of vulnerabilities that have been seen abused by threat actors in attacks and that are required to be patched by Federal Civilian Executive Branch (FCEB) agencies.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #cybersecurity #dhs #cisa #vulnerabilities #vulnerabilitycatalog #fceb #federalgovernment #usa

CISA adds 17 vulnerabilities to list of bugs exploited in attacks This week, the Cybersecurity and Infrastructure Security Agency (CISA) added seventeen actively exploited vulnerabilities to the 'Known Exploited Vulnerabilities Catalog.

McAfee Agent bug lets hackers run code with Windows SYSTEM privileges 01/21/2022

McAfee Agent bug lets hackers run code with Windows SYSTEM privileges

McAfee Enterprise (now rebranded as Trellix) has patched a security vulnerability discovered in the company's McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges.

McAfee Agent is a client-side component of McAfee ePolicy Orchestrator (McAfee ePO) that downloads and enforces endpoint policies and deploys antivirus signatures, upgrades, patches, and new products on enterprise endpoints.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #security #software #windows #cyber #cybersecurity #mcafee #mcafeeenterprise #epo #hbss #microsoft

McAfee Agent bug lets hackers run code with Windows SYSTEM privileges McAfee Enterprise (now rebranded as Trellix) has patched a security vulnerability discovered in the company's McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges.

Microsoft disables Excel 4.0 macros by default to block malware 01/21/2022

Microsoft disables Excel 4.0 macros by default to block malware

Microsoft has announced that Excel 4.0 (XLM) macros will now be disabled by default to protect customers from malicious documents.

In October, the company first revealed in a Microsoft 365 message center update that it would disable XLM macros in all tenants if the users or admins hadn't manually toggled the feature on or off.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #microsoft #excel #cyber #cybersecurity #office365 #o365 #o365security #macros #macrosecurity #xlm #malware #malwareattacks

Microsoft disables Excel 4.0 macros by default to block malware ​Microsoft has announced that Excel 4.0 (XLM) macros will now be disabled by default to protect customers from malicious documents.

McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges 01/21/2022

McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges

McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code ex*****on with SYSTEM privileges.

McAfee has patched two high-severity vulnerabilities in a component of its McAfee Enterprise product that attackers can use to escalate privileges, including up to SYSTEM.

By Lisa Vaas - threatpost
#greywolfsec #mcafee #cybersecurity #cyber #antivirus #antivirussoftware #microsoft #windows #exploit #vulnerability #securitybug

McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code ex*****on with SYSTEM privileges.

Phishing impersonates shipping giant Maersk to push STRRAT malware 01/21/2022

Phishing impersonates shipping giant Maersk to push STRRAT malware

A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim's devices.

Fortinet discovered the new campaign after spotting phishing emails impersonating Maersk Shipping, a giant in the global shipping industry, and using seemingly legitimate email addresses.

By Bill Toulas - Bleeping Computer
#greywolfsec #emailsecurity #shipping #phishingemails #cyber #cybersecurity #maesrkshipping #maesrk #maesrkline #supplychain #shippingindustry #fortinet #strrat #rat #remoteaccestrojan #phishing #scammers #malwareattacks #malware

Phishing impersonates shipping giant Maersk to push STRRAT malware A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim's devices.

Biden signs memo to boost US national security systems’ defenses 01/20/2022

Biden signs memo to boost US national security systems’ defenses

President Joe Biden signed a national security memorandum (NSM) on Wednesday to increase the security of national security systems part of critical US government networks used in military and intelligence activities when storing or transferring classified info.

"Modernizing our cybersecurity defenses and protecting all federal networks is a priority for the Biden Administration, and this National Security Memorandum raises the bar for the cybersecurity of our most sensitive systems," the White House said.

By Sergiu Gatlan - Bleeping Computer
#greywolfsec #cybersecurity #nationalsecurity #intelligence #whitehouse #nationaldefense #cyberdefense #nsm #nationalsecuritymemorandum

Biden signs memo to boost US national security systems’ defenses President Joe Biden signed a national security memorandum (NSM) on Wednesday to increase the security of national security systems part of critical US government networks used in military and intelligence activities when storing or transferring classified info.

WordPress plugin flaw puts users of 20,000 sites at phishing risk 01/20/2022

WordPress plugin flaw puts users of 20,000 sites at phishing risk

The WordPress WP HTML Mail plugin, installed in over 20,000 sites, is vulnerable to a high-severity flaw that can lead to code injection and the distribution of convincing phishing emails.

'WP HTML Mail' is a plugin used for designing custom emails, contact form notifications, and generally tailored messages that online platforms send to their audience.

By Bill Toulas - Bleeping Computer
#greywolfsec #wordpress #html #cybersecurity #vulnerability #vulnerabilitymanagement #phishing #wphtmlmail #wpplugin #codeinjection #wpflaw #pluginflaw

WordPress plugin flaw puts users of 20,000 sites at phishing risk The WordPress WP HTML Mail plugin, installed in over 20,000 sites, is vulnerable to a high-severity flaw that can lead to code injection and the distribution of convincing phishing emails.

‘Anomalous’ spyware stealing credentials in industrial firms 01/20/2022

‘Anomalous’ spyware stealing credentials in industrial firms

Researchers have uncovered several spyware campaigns that target industrial enterprises, aiming to steal email account credentials and conduct financial fraud or resell them to other actors.

The actors use off-the-shelf spyware tools but only deploy each variant for a very limited time to evade detection.

By Bill Toulas - Bleeping Computer
#greywolfsec #cyber #cybersecurity #email #spyware #spywaretools #anomalous

‘Anomalous’ spyware stealing credentials in industrial firms Researchers have uncovered several spyware campaigns that target industrial enterprises, aiming to steal email account credentials and conduct financial fraud or resell them to other actors.

Marketing giant RRD confirms data theft in Conti ransomware attack 01/19/2022

Marketing giant RRD confirms data theft in Conti ransomware attack

RR Donnelly has confirmed that threat actors stole data in a December cyberattack, confirmed by BleepingComputer to be a Conti ransomware attack.

RR Donnelly (RRD) is a leading integrated services company offering communications, commercial printing, and marketing to enterprise clients. The company employs 33,000 people in over 200 locations and earned $4.93 billion in 2021.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #databreach #marketing #cyberattack #ransomware #conti #rrd #rrdonnelly

Marketing giant RRD confirms data theft in Conti ransomware attack RR Donnelly has confirmed that threat actors stole data in a December cyberattack, confirmed by BleepingComputer to be a Conti ransomware attack.

Office 365 phishing attack impersonates the US Department of Labor 01/19/2022

Office 365 phishing attack impersonates the US Department of Labor

A new phishing campaign impersonating the United States Department of Labor asks recipients to submit bids to steal Office 365 credentials.

The phishing campaign has been ongoing for at least a couple of months and utilizes over ten different phishing sites impersonating the government agency.

By Bill Toulas - Bleeping Computer
#greywolfsec #office365 #cyber #cybersecurity #emailsecurity #informationtechnology #usdol #dol #scammers #phishing #phishingattack #fraud #fraudsters

Office 365 phishing attack impersonates the US Department of Labor A new phishing campaign impersonating the United States Department of Labor asks recipients to submit bids to steal Office 365 credentials.

Cybercriminals Actively Target VMware vSphere with Cryptominers 01/19/2022

Cybercriminals Actively Target VMware vSphere with Cryptominers

VMware’s container-based application development environment has become attractive to cyberattackers.

Organizations running sophisticated virtual networks with VMware’s vSphere service are actively being targeted by cryptojackers, who have figured out how to inject the XMRig commercial cryptominer into the environment, undetected.

By Becky Bracken - threatpost
#greywolfsec #vmware #cybersecurity #vsphere #xmrig #cryptominer #crypto #cryptojackers

Cybercriminals Actively Target VMware vSphere with Cryptominers VMware's container-based application development environment has become attractive to cyberattackers.

Cloned Dept. of Labor Site Hawks Fake Government Contracts 01/19/2022

Cloned Dept. of Labor Site Hawks Fake Government Contracts

A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects — but harvests credentials instead.

A new phishing campaign is targeting aspiring government vendors with an invitation to bid on various fake federal projects with the U.S. Department of Labor.

By Becky Bracken - threatpost
#greywolfsec #cybersecurity #usdol #dol #phishing #phishingattacks #phishingemails #phishingwebsite #governmentcontracting #scammers #governmentprocurement #federalgovernment #federalcontracting

Cloned Dept. of Labor Site Hawks Fake Government Contracts A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects — but harvests credentials instead.

CISA urges US orgs to prepare for data-wiping cyberattacks 01/19/2022

CISA urges US orgs to prepare for data-wiping cyberattacks

The Cybersecurity and Infrastructure Security Agency (CISA) urges U.S. organizations to strengthen their cybersecurity defenses against data-wiping attacks recently seen targeting Ukrainian government agencies and businesses.

As reported by BleepingComputer, Ukraine government agencies and corporate entities suffered coordinated cyberattacks last Friday where websites were defaced, and data-wiping malware was deployed to corrupt data and cause Windows devices to become inoperable.

By Lawrence Abrams - Bleeping Computer
#greywolfsec #cybersecurity #dhs #cisa #microsoft #windows #ukraine #ukrainegovernment #datawiping #datarecovery #databackup #disasterrecovery

CISA urges US orgs to prepare for data-wiping cyberattacks The Cybersecurity and Infrastructure Security Agency (CISA) urges U.S. organizations to strengthen their cybersecurity defenses against data-wiping attacks recently seen targeting Ukrainian government agencies and businesses.

eNom data center migration mistakenly knocks sites offline 01/18/2022

eNom data center migration mistakenly knocks sites offline

A data center migration from eNom web hosting provider caused unexpected domain resolution problems that are expected to last for a few hours.

Customers started to complain that they could no longer access their websites and emails due to Domain Name System (DNS) issues.

By Ionut Ilascu - Bleeping Computer
#greywolfsec #datacenter #datacenterindustry #cyber #cybersecurity #dns #dnsfailure #enom #enomhosting #customeroutage

eNom data center migration mistakenly knocks sites offline A data center migration from eNom web hosting provider caused unexpected domain resolution problems that are expected to last for a few hours.

Safari bug leaks your Google account info, browsing history 01/18/2022

Safari bug leaks your Google account info, browsing history

There's a problem with the implementation of the IndexedDB API in Safari's WebKit engine, which could result in leaking browsing activity in real-time and even user identities to anyone exploiting this flaw.

IndexedDB is a widely used browser API that is a versatile client-side storage system with no capacity limits.

By Bill Toulas - Bleeping Computer
#greywolfsec #cyber #cybersecurity #indexeddb #api #safari #webkit #safaribug #securitybug #dataprivacy #userprivacy #privacy

Safari bug leaks your Google account info, browsing history There's a problem with the implementation of the IndexedDB API in Safari's WebKit engine, which could result in leaking browsing histories and even user identities to anyone exploiting the flaw.

DHL dethrones Microsoft as most imitated brand in phishing attacks 01/18/2022

DHL dethrones Microsoft as most imitated brand in phishing attacks

DHL was the most imitated brand in phishing campaigns throughout Q4 2021, pushing Microsoft to second place, and Google to fourth.

This isn't surprising considering that the final quarter of every year includes the Black Friday, Cyber Monday, and Christmas shopping season, so phishing lures based on package deliveries naturally increase.

By Bill Toulas - Bleeping Computer
#greywolfsec #microsoft #cyber #google #cybersecurity #dhl #phishing #phishingemails #phishingscams #scammers #fraud #cybercrime

DHL dethrones Microsoft as most imitated brand in phishing attacks DHL was the most imitated brand in phishing campaigns throughout Q4 2021, pushing Microsoft to second place, and Google to fourth.

Category

Products

Continuous Monitoring
We use the latest technology to detect compliance and risk issues associated with an organization’s operational environment.

Cloud Security
Also known as cloud computing security, we use a combination of policies, procedures and technical controls to secure your data. Our cloud experts stay current with the latest technology and best practices.

Digital Forensics
We identify, collect, analyze, and report on valuable digital information related to computer crimes.

Firewall Engineering
We design, build, and manage the security infrastructure of IT systems. This includes firewalls, and Virtual Private Networks (VPNs) for your organization.

IDS/IPS Engineering
We implement Intrusion Detection Systems (IDS) to monitor network traffic for suspicious activity. We can fine tune these systems to reduce false positives so that your analysts are not chasing bad leads while missing the real threats. Intrusion Prevention Systems (IPS) can be configured to halt attacks before they reach your network.

Incident Response
We will help define and execute a plan to handle security incidents, breaches, and cyber threats. A carefully defined plan mitigates the chance of damage or loss during a cyber-attack, and lowers the chance of having another one in the future.

Pe*******on Testing
We offer pe*******on testing, or “pen testing” or “ethical hacking,” to test your applications, networks and systems. This service allows for simulation of real-world hacking attempts. Incident response functions can be tested as well as technical defenses.

Risk Assessment
This is an evaluation to determine what cyber factors are working against your mission. We can determine points of entry and help you mitigate these risks to an acceptable level.

Security Analysis
We evaluate network and host activity on a continuous basis using the latest technology and techniques. All areas of your infrastructure are examined to ensure risks are mitigated appropriately.

Security Architecture and Design
We help you design secure solutions around your current or new infrastructure.

Security Implementation
We can create and implement security features for your mission so you don’t have to. We bring in experts to protect all areas of your organization.

Security Operations and Maintenance
We monitor, upgrade, and maintain your existing cyber systems and tools.

Security Project Management
Our seasoned professionals leverage their experience to ensure your complex security requirements are met and your project progresses on schedule.

SIEM Engineering
Security Information and Event Management software services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security threats of applications and network hardware. Our experts can configure these systems to maximize visibility inside your networks and hosts while preserving your existing technology investments.

SOC Management
The management of a security operation is a critical task. We have capable staff with a proven track record of leading security operations across the federal and private sectors.

Software Assurance
Our staff will review your already created code for vulnerabilities. If you bring us on early in the design phase, we can help you create and deploy code that is secure from the start.

Threat Intelligence
We employ tradecraft that allow us to gather information about threats facing your organization. This knowledge is then used to build out use cases. These use cases allow us to tailor your defensive posture and stay prepared in an ever-changing threat landscape.

Vulnerability Assessment and Analysis
We provide a detailed analysis and summary of vulnerabilities against your critical assets. We can also help you assess which parts of your infrastructure are most important which helps in positioning defenses.

Telephone

Address


161 Fort Evans Rd NE STE 250
Leesburg, VA
20176

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Friday 9am - 5pm
Other Business Services in Leesburg (show all)
Dynamic Merchants # 14608 Dynamic Merchants # 14608
Leesburg, 20176

Sentry Management, Inc. Sentry Management, Inc.
50 Catoctin Circle NE, Suite 301
Leesburg, 20176

The Loudoun Office of Sentry Management provides community association management services in the Washington Metro area, as well as Central and Southeastern Virginia and the Shenandoah Valley.

Scan DMV Scan DMV
121 Goldsworth Terr SW
Leesburg, 20175

We can help you preserve the most important of memories by digitizing your photos, negatives, film, slides, video tape and more.

NiyamIT NiyamIT
202 Church St SE
Leesburg, 20176

NiyamIT is a provider of technology and consulting services to a wide array of clients. Focused on driving long-term change and transforming the experience, NiyamIT partners with our clients to drive their mission in an effective and robust manner.

Exec Concepts Exec Concepts
525-K East Market Street Suite 284
Leesburg, 20176

We work incredibly hard to get you the latest technologies, with superior service and for less money - so you can focus on the success of your company. ExecConcepts.com [email protected] (877) 472-7727

Nutri Muscle Meals Nutri Muscle Meals
1602 Village Market Blvd. #120
Leesburg, 20175

Loudoun County’s meal prep delivery / Pick up at our home commercial kitchen chefscape in Leesburg

4.10 Photography 4.10 Photography
19019 Upper Belmont Place
Leesburg, 20176

Ábaco Strategy Ábaco Strategy
107 Harrison St NE
Leesburg, 20176

Ábaco Strategy is a certified 8(a), HubZone, Minority-Owned and Woman-Owned for-profit business, based out of Leesburg, Virginia.

UNIKO Event and Party Decor UNIKO Event and Party Decor
Leesburg, 20175

AlphaGraphics Loudoun AlphaGraphics Loudoun
604 S King St Ste 101
Leesburg, 20175

AlphaGraphics is a locally owned and operated, full-service marketing communications company passionate about promoting local businesses & nonprofits.

Potomac Printing Solutions Potomac Printing Solutions
19441 Golf Vista Plz
Leesburg, 20176

Potomac Printing Solutions is a full service printing company offering- Printing /Promotional Products /Direct Mail /Apparel / Design / Signs&Banners.

Always Best Care Loudoun Always Best Care Loudoun
44084 Riverside Parkway, Ste. LL325
Leesburg, 20176

Always Best Care Senior Services provides senior care in Loudoun County, including the communities of Purcellville, Ashburn, Hamilton and many more.