Defensive Methodology

Ransomware case study: echoraix

By |2024-08-05T14:49:05-04:00August 5th, 2024|Categories: Attribution, Case Study, Defensive Methodology, Forensic, Reports|Tags: , , |

We are providing our case study on echoraix, a ransomware group that targets network connected storage appliances from QNAP and Synology. Please share this case study with others and contact us for similar case studies, or related protection services. CompSec-Direct-echoraix-report-Apr-6-2024

Comments Off on Ransomware case study: echoraix

Using containers to analyze malware at scale coming to BSides Nova 2023

By |2023-08-15T07:29:29-04:00August 15th, 2023|Categories: Containers, Cyber, Defensive Methodology, Events, Training, Uncategorized|Tags: , , , , |

🕵‍Our President, Jose Fernandez will run our Using containers to analyze malware at scale (UCTAMAS) workshop at BSidesNoVA on Sep 8, 2023. This is the 4th run of this workshop which takes participant feedback to improve each iteration in technical content and delivery of workshop objectives.👨‍💻 If you are interested in containers, malware analysis and red [...]

Comments Off on Using containers to analyze malware at scale coming to BSides Nova 2023

Malware analysis workshop at AvengerCon VII

By |2022-12-05T10:15:54-05:00December 5th, 2022|Categories: Automation, Containers, Cyber, Defensive Methodology, Hunting, Training|Tags: , , , , |

Our President, Jose Fernandez, ran a malware analysis workshop using containers during AvengerCon VII. The event, hosted at Dreamport in Columbia, MD allowed participants to use Kleared4, our disassociated cyber-range, to safely analyze and triage malware samples in a controlled environment. Participants analyzed ransomware samples, and random samples in both Linux and Windows containers. If you [...]

Comments Off on Malware analysis workshop at AvengerCon VII

CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

By |2022-12-05T10:24:21-05:00August 18th, 2022|Categories: Contracts, Cyber, Defensive Methodology, Design, firmware, News, Partnerships|Tags: , , , , , |

CompSec Direct is Microsoft approved for firmware analysis. This is a new partner specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment. Contact us at info@compsecdirect.com for more details.

Comments Off on CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

Ransomware: Hacienda of Puerto Rico

By |2023-04-15T14:36:51-04:00June 21st, 2021|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Firewall, Forensic, Hacking, Incident Response, Reports|Tags: , , |

Ransomware: Hacienda of Puerto Rico

Comments Off on Ransomware: Hacienda of Puerto Rico

Kleared4 closed-operation fly-away edge kit

By |2022-06-14T23:15:09-04:00June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|Tags: , , , , |

Kleared4 closed-operation fly-away edge kit

Comments Off on Kleared4 closed-operation fly-away edge kit

BSides PR 2019

By |2022-06-15T00:20:50-04:00October 16th, 2019|Categories: Case Study, Cyber, Defensive Methodology, Disclosure, Forensic, Incident Response, Laws, Legislation, Videos|Tags: , , , , , , , |

Our President, @jfersec, had the privilege of Keynote during BSides PR 2019. During our presentation, we discussed some hard truth's around: the way DeepFakes and "WeakFakes" are utilizedhow we are good imitators and bad innovators in Puerto Ricopast efforts associated with Accelerated Disclosures for public and private companies in Puerto Ricoflaws associated with contract negotiations with [...]

Comments Off on BSides PR 2019

Case 1

By |2022-06-15T01:30:31-04:00August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: , , , , |

Case 1. If you like the case study, hit us up and let us know. Take care. Malware Analysis on Hybrid-Analysis. case1Download

Comments Off on Case 1

CompSec Direct now approved Cyber-security vendor in Maryland

By |2022-06-15T00:32:05-04:00August 15th, 2019|Categories: Contracts, Cyber, Defensive Methodology, Forensic, Hunting, News, Pen-testing, Social Engineering|Tags: , , , , , |

CompSec Direct has been approved as a Qualified Maryland Cybersecurity Seller (QMCS) by the Department of Commerce of Maryland. This allows us to provide cybersecurity services to qualifying companies under the Buy Maryland Cybersecurity (BMC) program. The program allows companies with 50 employees or less to purchase services and products from approved vendors like CompSec Direct. [...]

Comments Off on CompSec Direct now approved Cyber-security vendor in Maryland

Apache brute: A simple brute force deterrent for Linux

By |2022-06-15T00:39:43-04:00May 31st, 2017|Categories: Defensive Methodology|Tags: , , , |

We published a simple script to help identify and block possible brute-force attempts on a Linux web-server. The script counts the amount of “bad-actions” an ip has logged in the Apache logs and blocks the ip on port 443. This script also displays top 20 visitor information using geoiplookup (which should be installed) and performs a [...]

Comments Off on Apache brute: A simple brute force deterrent for Linux
Go to Top