Defensive Methodology

Breach Village Capture the Flag and Hack the Case

By |2025-04-29T20:56:29-04:00April 15th, 2025|Categories: Breach, Creative, Cyber, Defensive Methodology, Demo, Events, Hacking, phishing, Training|Tags: , , , |

CompSec Direct ran Breach Village during a local BSides conference. "We wanted Breach Village to showcase real-problems and not the made up scenarios people see in Capture the Flags events. Realism and modern problems in cyber security are difficult to showcase into a fun learning environment" said Jose Fernandez. Breach Village used our Kleared4 cyber range [...]

Comments Off on Breach Village Capture the Flag and Hack the Case

AI Powered Phishing Rating

By |2025-04-29T14:41:10-04:00March 11th, 2025|Categories: AI, Automation, Containers, Cyber, Defensive Methodology, phishing, Software|Tags: , , , , |

CompSec Direct developed an AI powered phishing rater to determine how impactful a phishing email or text is. We created a simple to use interface powered by a well designed framework to accurately measure phishing communications across multiple industries. Our AI system operates using local large learning models (LLMs) as opposed to online services from GPT [...]

Comments Off on AI Powered Phishing Rating

Kleared4 Edge Fly Away Kits

By |2025-04-29T14:19:36-04:00January 3rd, 2025|Categories: Cyber, Defensive Methodology, Design, Hunting, Incident Response, Pen-testing|Tags: , , |

During pandemic, we could not travel to customer locations and wanted to continue working on providing quality pentests and incident response services. CompSec Direct created small shippable cyber kits packaged inside PPE containers and has continued to improve this concept. "For us it was simple, adapt or close. While other vendors create large field kits, we [...]

Comments Off on Kleared4 Edge Fly Away Kits

Using Containers to Analyze Malware at Scale workshops

By |2025-04-29T13:12:13-04:00August 20th, 2024|Categories: AV Bypass, Containers, Cyber, Defensive Methodology, Events, Hacking, Training|Tags: , , , |

Our president was able to teach over 200 participants at six cyber security focused conferences in an full-day workshop. Participants used Kleared4, our US made and hosted cyber range to analyze malware samples in a safe environment. "The best part about our range is that we provide all users a way to use real-world threats in [...]

Comments Off on Using Containers to Analyze Malware at Scale workshops

Ransomware case study: echoraix

By |2024-08-05T14:49:05-04:00August 5th, 2024|Categories: Attribution, Case Study, Defensive Methodology, Forensic, Reports|Tags: , , |

We are providing our case study on echoraix, a ransomware group that targets network connected storage appliances from QNAP and Synology. Please share this case study with others and contact us for similar case studies, or related protection services. CompSec-Direct-echoraix-report-Apr-6-2024

Comments Off on Ransomware case study: echoraix

Using containers to analyze malware at scale coming to BSides Nova 2023

By |2023-08-15T07:29:29-04:00August 15th, 2023|Categories: Containers, Cyber, Defensive Methodology, Events, Training, Uncategorized|Tags: , , , , |

🕵‍Our President, Jose Fernandez will run our Using containers to analyze malware at scale (UCTAMAS) workshop at BSidesNoVA on Sep 8, 2023. This is the 4th run of this workshop which takes participant feedback to improve each iteration in technical content and delivery of workshop objectives.👨‍💻 If you are interested in containers, malware analysis and red [...]

Comments Off on Using containers to analyze malware at scale coming to BSides Nova 2023

Malware analysis workshop at AvengerCon VII

By |2022-12-05T10:15:54-05:00December 5th, 2022|Categories: Automation, Containers, Cyber, Defensive Methodology, Hunting, Training|Tags: , , , , |

Our President, Jose Fernandez, ran a malware analysis workshop using containers during AvengerCon VII. The event, hosted at Dreamport in Columbia, MD allowed participants to use Kleared4, our disassociated cyber-range, to safely analyze and triage malware samples in a controlled environment. Participants analyzed ransomware samples, and random samples in both Linux and Windows containers. If you [...]

Comments Off on Malware analysis workshop at AvengerCon VII

CompSec Direct recognized by Microsoft with Firmware analysis specialization

By |2024-12-16T19:04:36-05:00August 18th, 2022|Categories: Contracts, Cyber, Defensive Methodology, Design, firmware, News, Partnerships|Tags: , , , , , |

CompSec Direct is Microsoft recognized for firmware analysis. This is a new specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment.

Comments Off on CompSec Direct recognized by Microsoft with Firmware analysis specialization

Ransomware: Hacienda of Puerto Rico

By |2023-04-15T14:36:51-04:00June 21st, 2021|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Firewall, Forensic, Hacking, Incident Response, Reports|Tags: , , |

Ransomware: Hacienda of Puerto Rico

Comments Off on Ransomware: Hacienda of Puerto Rico

Kleared4 closed-operation fly-away edge kit

By |2022-06-14T23:15:09-04:00June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|Tags: , , , , |

Kleared4 closed-operation fly-away edge kit

Comments Off on Kleared4 closed-operation fly-away edge kit
Go to Top