Cyber

Kleared4 closed-operation fly-away edge kit

By |2022-06-14T23:15:09-04:00June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|Tags: , , , , |

Kleared4 closed-operation fly-away edge kit

Comments Off on Kleared4 closed-operation fly-away edge kit

CompSec Direct wins firmware analysis prototype event held at Dreamport

By |2022-06-15T01:30:07-04:00June 8th, 2020|Categories: Automation, Cyber, Reports|Tags: , , , |

After placing 5th on a previous challenge, we were happy to place 1st on a subsequent firmware c. We improved our process, provided analysis and emulation findings to set us apart from the rest. Please visit https://dreamport.tech/events/event-rpe-the-broken-gear-in-the-watch-02.php for more information on the technical aspects of this challenge.

Comments Off on CompSec Direct wins firmware analysis prototype event held at Dreamport

BSides PR 2019

By |2022-06-15T00:20:50-04:00October 16th, 2019|Categories: Case Study, Cyber, Defensive Methodology, Disclosure, Forensic, Incident Response, Laws, Legislation, Videos|Tags: , , , , , , , |

Our President, @jfersec, had the privilege of Keynote during BSides PR 2019. During our presentation, we discussed some hard truth's around: the way DeepFakes and "WeakFakes" are utilizedhow we are good imitators and bad innovators in Puerto Ricopast efforts associated with Accelerated Disclosures for public and private companies in Puerto Ricoflaws associated with contract negotiations with [...]

Comments Off on BSides PR 2019

CTF-Pasteables

By |2022-06-13T17:38:43-04:00October 16th, 2019|Categories: Cyber, Hacking, Pen-testing, Powershell, Scripts, Tor|

“Typing Kills”, so even if you do not agree with this; it’s true. Operator error grows the more you type. It’s akin to “measure twice, cut once”. In Capture the Flags (CTF’s), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

Comments Off on CTF-Pasteables

Case 1

By |2022-06-15T01:30:31-04:00August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: , , , , |

Case 1. If you like the case study, hit us up and let us know. Take care. Malware Analysis on Hybrid-Analysis. case1Download

Comments Off on Case 1

CompSec Direct now approved Cyber-security vendor in Maryland

By |2022-06-15T00:32:05-04:00August 15th, 2019|Categories: Contracts, Cyber, Defensive Methodology, Forensic, Hunting, News, Pen-testing, Social Engineering|Tags: , , , , , |

CompSec Direct has been approved as a Qualified Maryland Cybersecurity Seller (QMCS) by the Department of Commerce of Maryland. This allows us to provide cybersecurity services to qualifying companies under the Buy Maryland Cybersecurity (BMC) program. The program allows companies with 50 employees or less to purchase services and products from approved vendors like CompSec Direct. [...]

Comments Off on CompSec Direct now approved Cyber-security vendor in Maryland

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

By |2022-06-15T00:45:03-04:00April 30th, 2017|Categories: Cyber, Demo, Laws, Reports|Tags: , , , , , , |

Our President, Jose Fernandez, presented ZigBee research at Bsides Charm 2017 in Baltimore on April 29, 2017. The presentation, called Frony Fronius: Exploring ZigBee signals from SolarCity covered IoT (Internet of Threats) findings on commercial solar panel solutions. Part of the presentation asked participants how they felt about e-meters and how companies are beginning to deploy [...]

Comments Off on CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

By |2022-06-15T00:46:16-04:00March 18th, 2017|Categories: Attribution, Contracts, Cyber, Defensive Methodology, Hunting, Incident Response, Reports|Tags: , , , , |

The Center of Investigative News (Centro de Periodismo Investigativo) published an excellent summary of events from the situation the department of Hacienda faced in early March of 2017. Our early involvement in this event helped the citizens of Puerto Rico during an already difficult economic situation. We will continue to work with the department of Hacienda [...]

Comments Off on CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

NTT Group Global Threat Intelligence Report 2016

By |2022-06-15T00:50:38-04:00October 19th, 2016|Categories: Cyber, Defensive Methodology, Forensic, Reports|Tags: , , , , , , |

GTIR 2016 NTT Group published a great threat report for 2016. Quality publication and definitely worth while. Good for CISO’s and Info Sec pros alike. Although some of the areas in the Key Findings are questionable given that we recently saw DDoS attacks above 1Tbs , other areas highlight recent trends that ultimately affect all of [...]

Comments Off on NTT Group Global Threat Intelligence Report 2016
Go to Top