(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Cyber

CTF-Pasteables

2022-06-13T17:38:43-04:00

“Typing Kills”, so even if you do not agree with this; it’s true. Operator error grows the more you type. It’s akin to “measure twice, cut once”. In Capture the Flags (CTF’s), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

CTF-Pasteables2022-06-13T17:38:43-04:00

CompSec Direct now approved Cyber-security vendor in Maryland

2022-06-15T00:32:05-04:00

CompSec Direct has been approved as a Qualified Maryland Cybersecurity Seller (QMCS) by the Department of Commerce of Maryland. This allows us to provide cybersecurity services to qualifying companies under the Buy Maryland Cybersecurity (BMC) program. The program allows companies with 50 employees or less to purchase services and products from approved vendors like CompSec Direct. [...]

CompSec Direct now approved Cyber-security vendor in Maryland2022-06-15T00:32:05-04:00

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

2022-06-15T00:45:03-04:00

Our President, Jose Fernandez, presented ZigBee research at Bsides Charm 2017 in Baltimore on April 29, 2017. The presentation, called Frony Fronius: Exploring ZigBee signals from SolarCity covered IoT (Internet of Threats) findings on commercial solar panel solutions. Part of the presentation asked participants how they felt about e-meters and how companies are beginning to deploy [...]

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor2022-06-15T00:45:03-04:00

CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

2022-06-15T00:46:16-04:00

The Center of Investigative News (Centro de Periodismo Investigativo) published an excellent summary of events from the situation the department of Hacienda faced in early March of 2017. Our early involvement in this event helped the citizens of Puerto Rico during an already difficult economic situation. We will continue to work with the department of Hacienda [...]

CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico2022-06-15T00:46:16-04:00

NTT Group Global Threat Intelligence Report 2016

2022-06-15T00:50:38-04:00

GTIR 2016 NTT Group published a great threat report for 2016. Quality publication and definitely worth while. Good for CISO’s and Info Sec pros alike. Although some of the areas in the Key Findings are questionable given that we recently saw DDoS attacks above 1Tbs , other areas highlight recent trends that ultimately affect all of [...]

NTT Group Global Threat Intelligence Report 20162022-06-15T00:50:38-04:00

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

2022-06-15T00:53:53-04:00

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files in conjunction with the Shodan api in python to search for associations between different different fields. Using this tool reduces initial [...]

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico2022-06-15T00:53:53-04:00

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

2022-06-13T18:23:30-04:00

We hosted a training session on remote incident response operation on Oct 7, 2016. The course was provided “pro-bono” through @Obsidis_NGO‏, participants paid a small registration fee that covered lunch. Students were able to analyze malware on remote systems in a safe and controlled environment using our RIL platform. We want to thank everyone who attended the session and [...]

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts2022-06-13T18:23:30-04:00

Forcepoint 2015 Threat Report

2022-06-15T00:55:26-04:00

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Forcepoint 2015 Threat Report2022-06-15T00:55:26-04:00

Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items

2022-06-13T18:34:26-04:00

CompSec Direct and other individuals and companies spoke out against the 2013 Wassenaar Arrangement. We hope our petitions for further revisions are heard. We have included a copy of the document submitted to http://www.regulations.gov/#!docketDetail;D=BIS-2015-0011 Wassenaar Agreement CompSecDirect We want to thank everyone that submitted and stood up for freedom of speech against the Wassenaar Arrangement 2013.

Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items2022-06-13T18:34:26-04:00
Go to Top