Case studies. Security
We are proud of our team and what we do and have decided to partially share our past projects and cases to provide our customers with a behind-the-scenes look at our process and our past experience. We made sure all cases are anonymous and do not disclose any confidential information, but still provide valuable insight.
During this social engineering engagement, it was possible to achieve persistent internal access, exfiltrate confidential and personal information, and compromise… Read more This case is a very good example why manual penetration tests are valuable - the team achieved compromise without administrator… Read more The adversary simulation activity helped the client identify and remediate multiple issues with the on-premise infrastructure and vulnerabilities, calculate potential… Read more The Azure penetration test helped the client identify and remediate multiple issues and misconfigurations, harden their infrastructure and calculate potential… Read more Evaluating EDR Product against Threat Actors: Uncovering Limitations and Collaboration for Enhanced Detection of Multiple Killchains. Read more Successful phishing attacks revealed detection gaps in support and SOC teams, allowing unauthorized access without alerts. Read more Weak authentication and poor segmentation enabled privilege escalation from VPN access to full domain control. Read more Poor network segmentation enabled an attacker to pivot from internal access to full cloud takeover. Read more A threat model helped prioritize vulnerabilities, leading to the identification of a phishing attack chain that bypassed MFA and allowed… Read more