Cyber

Breach Village Capture the Flag and Hack the Case

By |2025-04-29T20:56:29-04:00April 15th, 2025|Categories: Breach, Creative, Cyber, Defensive Methodology, Demo, Events, Hacking, phishing, Training|Tags: , , , |

CompSec Direct ran Breach Village during a local BSides conference. "We wanted Breach Village to showcase real-problems and not the made up scenarios people see in Capture the Flags events. Realism and modern problems in cyber security are difficult to showcase into a fun learning environment" said Jose Fernandez. Breach Village used our Kleared4 cyber range [...]

Comments Off on Breach Village Capture the Flag and Hack the Case

AI Powered Phishing Rating

By |2025-04-29T14:41:10-04:00March 11th, 2025|Categories: AI, Automation, Containers, Cyber, Defensive Methodology, phishing, Software|Tags: , , , , |

CompSec Direct developed an AI powered phishing rater to determine how impactful a phishing email or text is. We created a simple to use interface powered by a well designed framework to accurately measure phishing communications across multiple industries. Our AI system operates using local large learning models (LLMs) as opposed to online services from GPT [...]

Comments Off on AI Powered Phishing Rating

Kleared4 Edge Fly Away Kits

By |2025-04-29T14:19:36-04:00January 3rd, 2025|Categories: Cyber, Defensive Methodology, Design, Hunting, Incident Response, Pen-testing|Tags: , , |

During pandemic, we could not travel to customer locations and wanted to continue working on providing quality pentests and incident response services. CompSec Direct created small shippable cyber kits packaged inside PPE containers and has continued to improve this concept. "For us it was simple, adapt or close. While other vendors create large field kits, we [...]

Comments Off on Kleared4 Edge Fly Away Kits

Using Containers to Analyze Malware at Scale workshops

By |2025-04-29T13:12:13-04:00August 20th, 2024|Categories: AV Bypass, Containers, Cyber, Defensive Methodology, Events, Hacking, Training|Tags: , , , |

Our president was able to teach over 200 participants at six cyber security focused conferences in an full-day workshop. Participants used Kleared4, our US made and hosted cyber range to analyze malware samples in a safe environment. "The best part about our range is that we provide all users a way to use real-world threats in [...]

Comments Off on Using Containers to Analyze Malware at Scale workshops

Trainings @Kleared4

By |2023-09-01T12:30:51-04:00September 1st, 2023|Categories: Containers, Cyber, Forensic, Incident Response, Training|

We offer comprehensive cyber security training using our Kleared4 cyber-range. Please use the links below to visit @Kleared4 for class information and details. Please contact us for details on performing in-person training, other options and questions using the form below. Course List: @Kleared4 Container Security Course (K4CS) @Kleared4 Tunneling & Tradecraft Course (K4TT) @Kleared4 Incident Management [...]

Comments Off on Trainings @Kleared4

Using containers to analyze malware at scale coming to BSides Nova 2023

By |2023-08-15T07:29:29-04:00August 15th, 2023|Categories: Containers, Cyber, Defensive Methodology, Events, Training, Uncategorized|Tags: , , , , |

🕵‍Our President, Jose Fernandez will run our Using containers to analyze malware at scale (UCTAMAS) workshop at BSidesNoVA on Sep 8, 2023. This is the 4th run of this workshop which takes participant feedback to improve each iteration in technical content and delivery of workshop objectives.👨‍💻 If you are interested in containers, malware analysis and red [...]

Comments Off on Using containers to analyze malware at scale coming to BSides Nova 2023

Know the players in Cyber: how little we know about the leaders of our cyber adversaries

By |2022-12-07T19:05:34-05:00December 7th, 2022|Categories: Creative, Cyber, Events, Networking, Reports, Survey|Tags: , , , , , |

During HammerCon 2022, we ran a timed 60-second 5 question quiz to determine which country was the biggest threat in Cyber. We created adaptive questions sets that would correspond to selections, and we were not surprised by the outcome. The quiz ran for 4 days, had 162 unique partial submissions and 47 complete submissions. Quiz Days [...]

Comments Off on Know the players in Cyber: how little we know about the leaders of our cyber adversaries

Malware analysis workshop at AvengerCon VII

By |2022-12-05T10:15:54-05:00December 5th, 2022|Categories: Automation, Containers, Cyber, Defensive Methodology, Hunting, Training|Tags: , , , , |

Our President, Jose Fernandez, ran a malware analysis workshop using containers during AvengerCon VII. The event, hosted at Dreamport in Columbia, MD allowed participants to use Kleared4, our disassociated cyber-range, to safely analyze and triage malware samples in a controlled environment. Participants analyzed ransomware samples, and random samples in both Linux and Windows containers. If you [...]

Comments Off on Malware analysis workshop at AvengerCon VII

Autodyne: Automated firmadyne for firmware emulation

By |2022-12-04T16:21:19-05:00December 4th, 2022|Categories: Automation, Containers, Cyber, emulation, firmware, Scripts|Tags: , , , , , |

Emulate device firmware using containers with Autodyne. We crossed 2k pulls on dockerhub! Our CI pipeline for daily updated images for ubuntu 18 / ubuntu 20 has been growing strong since we open-sourced the images. Daily Docker images: https://hub.docker.com/r/compsecdirect/autodyne Check out our Github project and please submit issues related the tool there: https://github.com/compsecdirect/autodyne

Comments Off on Autodyne: Automated firmadyne for firmware emulation

CompSec Direct recognized by Microsoft with Firmware analysis specialization

By |2024-12-16T19:04:36-05:00August 18th, 2022|Categories: Contracts, Cyber, Defensive Methodology, Design, firmware, News, Partnerships|Tags: , , , , , |

CompSec Direct is Microsoft recognized for firmware analysis. This is a new specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment.

Comments Off on CompSec Direct recognized by Microsoft with Firmware analysis specialization
Go to Top