compsec-direct-media

About CompSec Direct

CompSec Direct is a C4ISR firm specialized in CyberSecurity. SDVOSB, QMCS & MBE certified firm of former DOD network operators.

Ransomware case study: echoraix

By |2024-08-05T14:49:05-04:00August 5th, 2024|Categories: Attribution, Case Study, Defensive Methodology, Forensic, Reports|Tags: , , |

We are providing our case study on echoraix, a ransomware group that targets network connected storage appliances from QNAP and Synology. Please share this case study with others and contact us for similar case studies, or related protection services. CompSec-Direct-echoraix-report-Apr-6-2024

Comments Off on Ransomware case study: echoraix

Trainings @Kleared4

By |2023-09-01T12:30:51-04:00September 1st, 2023|Categories: Containers, Cyber, Forensic, Incident Response, Training|

We offer comprehensive cyber security training using our Kleared4 cyber-range. Please use the links below to visit @Kleared4 for class information and details. Please contact us for details on performing in-person training, other options and questions using the form below. Course List: @Kleared4 Container Security Course (K4CS) @Kleared4 Tunneling & Tradecraft Course (K4TT) @Kleared4 Incident Management [...]

Comments Off on Trainings @Kleared4

Using containers to analyze malware at scale coming to BSides Nova 2023

By |2023-08-15T07:29:29-04:00August 15th, 2023|Categories: Containers, Cyber, Defensive Methodology, Events, Training, Uncategorized|Tags: , , , , |

🕵‍Our President, Jose Fernandez will run our Using containers to analyze malware at scale (UCTAMAS) workshop at BSidesNoVA on Sep 8, 2023. This is the 4th run of this workshop which takes participant feedback to improve each iteration in technical content and delivery of workshop objectives.👨‍💻 If you are interested in containers, malware analysis and red [...]

Comments Off on Using containers to analyze malware at scale coming to BSides Nova 2023

My CPAP has a recall; let’s open it instead!

By |2023-08-13T12:50:04-04:00August 12th, 2023|Categories: Demo, firmware, Forensic, Hacking, Medical, Videos|Tags: , , , , , , |

"If you or a loved one has ever used a CPAP device..." Our President, Jose Fernandez, gave a medical device presentation at BioHacking Village during DefCon 31. This presentation focused on bringing awareness to privacy related issues related CPAP devices, how to passively identify some CPAP devices and follow on work for exploit related research for [...]

Comments Off on My CPAP has a recall; let’s open it instead!

Know the players in Cyber: how little we know about the leaders of our cyber adversaries

By |2022-12-07T19:05:34-05:00December 7th, 2022|Categories: Creative, Cyber, Events, Networking, Reports, Survey|Tags: , , , , , |

During HammerCon 2022, we ran a timed 60-second 5 question quiz to determine which country was the biggest threat in Cyber. We created adaptive questions sets that would correspond to selections, and we were not surprised by the outcome. The quiz ran for 4 days, had 162 unique partial submissions and 47 complete submissions. Quiz Days [...]

Comments Off on Know the players in Cyber: how little we know about the leaders of our cyber adversaries

Malware analysis workshop at AvengerCon VII

By |2022-12-05T10:15:54-05:00December 5th, 2022|Categories: Automation, Containers, Cyber, Defensive Methodology, Hunting, Training|Tags: , , , , |

Our President, Jose Fernandez, ran a malware analysis workshop using containers during AvengerCon VII. The event, hosted at Dreamport in Columbia, MD allowed participants to use Kleared4, our disassociated cyber-range, to safely analyze and triage malware samples in a controlled environment. Participants analyzed ransomware samples, and random samples in both Linux and Windows containers. If you [...]

Comments Off on Malware analysis workshop at AvengerCon VII

Autodyne: Automated firmadyne for firmware emulation

By |2022-12-04T16:21:19-05:00December 4th, 2022|Categories: Automation, Containers, Cyber, emulation, firmware, Scripts|Tags: , , , , , |

Emulate device firmware using containers with Autodyne. We crossed 2k pulls on dockerhub! Our CI pipeline for daily updated images for ubuntu 18 / ubuntu 20 has been growing strong since we open-sourced the images. Daily Docker images: https://hub.docker.com/r/compsecdirect/autodyne Check out our Github project and please submit issues related the tool there: https://github.com/compsecdirect/autodyne

Comments Off on Autodyne: Automated firmadyne for firmware emulation

CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

By |2022-12-05T10:24:21-05:00August 18th, 2022|Categories: Contracts, Cyber, Defensive Methodology, Design, firmware, News, Partnerships|Tags: , , , , , |

CompSec Direct is Microsoft approved for firmware analysis. This is a new partner specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment. Contact us at info@compsecdirect.com for more details.

Comments Off on CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

BSides Charm 2022

By |2022-12-04T16:43:29-05:00May 2nd, 2022|Categories: Cyber, Events, Networking|Tags: , , |

We helped the event by providing sponsorship funds. This allows BSides to continue operating, providing speaking opportunities, and presentation workshops within the local area that would otherwise be presented at larger security conferences. Thanks for everyone that attend the event, and special thanks to those that dropped by to say hi at the booth.

Comments Off on BSides Charm 2022
Go to Top