(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Hacking

Intelligence Community (IC) BEC and Phishing leads to a bad day: Why using Kleared4 kicks ass

2025-07-18T13:49:34-04:00

On July 17 2025, we received an email from an IC company. Thing is, we can’t be sure about emails like this since we do Business Development (BD), but none of us knew the person sending the email and the Request For Information or RFI seemed odd. Figure 1: Email with suspicious link: https[:]//siliconoasis.co/connected Our President, [...]

Intelligence Community (IC) BEC and Phishing leads to a bad day: Why using Kleared4 kicks ass2025-07-18T13:49:34-04:00

Breach Village Capture the Flag and Hack the Case

2025-04-29T20:56:29-04:00

CompSec Direct ran Breach Village during a local BSides conference. "We wanted Breach Village to showcase real-problems and not the made up scenarios people see in Capture the Flags events. Realism and modern problems in cyber security are difficult to showcase into a fun learning environment" said Jose Fernandez. Breach Village used our Kleared4 cyber range [...]

Breach Village Capture the Flag and Hack the Case2025-04-29T20:56:29-04:00

Using Containers to Analyze Malware at Scale workshops

2025-04-29T13:12:13-04:00

Our president was able to teach over 200 participants at six cyber security focused conferences in an full-day workshop. Participants used Kleared4, our US made and hosted cyber range to analyze malware samples in a safe environment. "The best part about our range is that we provide all users a way to use real-world threats in [...]

Using Containers to Analyze Malware at Scale workshops2025-04-29T13:12:13-04:00

My CPAP has a recall; let’s open it instead!

2023-08-13T12:50:04-04:00

"If you or a loved one has ever used a CPAP device..." Our President, Jose Fernandez, gave a medical device presentation at BioHacking Village during DefCon 31. This presentation focused on bringing awareness to privacy related issues related CPAP devices, how to passively identify some CPAP devices and follow on work for exploit related research for [...]

My CPAP has a recall; let’s open it instead!2023-08-13T12:50:04-04:00

CTF-Pasteables

2022-06-13T17:38:43-04:00

“Typing Kills”, so even if you do not agree with this; it’s true. Operator error grows the more you type. It’s akin to “measure twice, cut once”. In Capture the Flags (CTF’s), we often redo the same methodology and the only thing we change are network variables and usernames, the syntax remains constant. Over the years, [...]

CTF-Pasteables2022-06-13T17:38:43-04:00

Judicial branch of Puerto Rico exposes sensitive court documents

2022-06-15T00:43:34-04:00

Problem CompSec Direct recently became aware of an information disclosure problem with the https://unired.ramajudicial.pr/lawyernotificationauthentication/ application used by the judicial branch of the Puerto Rico government. The application uses a weak sequential ID string that is provided to attorneys and clients in order to view sensitive legal documents. Manipulating the ID string with simple math, similar to the overturned [...]

Judicial branch of Puerto Rico exposes sensitive court documents2022-06-15T00:43:34-04:00

Forcepoint 2015 Threat Report

2022-06-15T00:55:26-04:00

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Forcepoint 2015 Threat Report2022-06-15T00:55:26-04:00
Go to Top