Foundation Security Benchmark
Secure, Defense, Protect & Monitor Networking, Applications, Data, Mobility and Internet of Things, Cloud, Virtualization, Exploits, Vulnerability/Malware, Reverse Engineering, Threats modeling and Advance Persistent Threats.
FORENSIC LABS & TESTING
Reverse Engineering, Malware Analysis, Malware Protection Signature, Secure Code Assessment, Binary Code Analysis, Static Analysis, Dynamic and Forensics Analysis, OS (Windows, Unix, Android, iOS) and Database Hardening, Network firewall and Application controls.
Enterprise IT Security, Mobility Security, Internet of Things (IoT) Security, Government Complaince & Audit Security, Telecom Security, Financial & Banking security, Security Standards OWASP, SANS. Information Security Management System (ISMS) 27001:2013
Assurance & Audit
Interact with academia and industry. Solidify IT Security & Risk Management, Asset Security, Security Architecture & Engineering, Communication & Network Security, Identity & Access Management, Security Assessment & Testing, Security Operations, Software Development Security.
Adoptive Security Controls
Cybersecurity has emerged as one of the critical domain of industries, global policies, products, services and competitions, with significant impacts on economic, political and military areas. The Internet of things, mobility and its related technologies integrate into nearly every aspect of society, business, and government, presenting opportunities for bad guys and adversaries to advance and to disrupt society and to gain un-ethical financial gains. As a result, governments and organizations continuously develop and evolve new operational doctrines, advanced cyberwarfare capabilities, security and risks assessment, risks detection and protection techniques and criminal tactics that threaten our information resources. This requires huge demand of skilled Security Analysts and Professionals for developing overall IT security roadmap of the organizations and industrial plants.
TO RESEARCH, ASSESS AND RESPOND ADVANCE RISKS & THREATS
ENABLES PEOPLE, PROCESS, TECHNOLOGY AND ECOSYSTEM
MONITOR KNOWN & UNKNOWN TO DETECT GAPS AND LOOPHOLES
TO ACT AND MATURE AS A SPECIALIZED MARKET LEADER
S Ashraf Jahangeer
Vulnerability and Malware Research Center
Researchers from anti-virus firm Dr.Web have discovered new malware designed to infect point-of-sale (PoS) terminals and capable of intercepting GET and POST requests sent from Web browsers on infected machines. Dubbed Trojan.MWZLesson, the Trojan can modify the registry branch in charge with autorun on the infected PoS terminals, while also being able to check the Read more about PoS Trojan steals card data and intercepts browser requests[…]
The Internet of Things Security Foundation (IoTSF), a collaborative initiative aimed at addressing concerns regarding the security of IoT, launched publicly in London this week. The foundation’s executive board includes security experts and several technology organizations, including BT, Vodafone, Imagination Technologies, Royal Holloway University of London, Copper Horse Solutions, Secure Thingz, NMI and PenTest Partners. Read more about IoT Security Foundation Launches[…]
Researchers have discovered a new piece of malware designed to target ATMs and allow malicious actors to quickly empty a machine’s cash vault. Stealing payment cards or card data can be lucrative for cybercriminals, but walking up to an ATM and commanding it to hand over all the money in its cash vault is much Read more about “GreenDispenser” ATM Malware Allows Attackers to Steal Cash[…]
ICS-CERT published advisories this week for a series of vulnerabilities affecting SCADA products from Resource Data Management, IBC Solar and EasyIO. The flaws detailed in ICS-CERT’s advisories were discovered and reported by security researcher Maxim Rupp. The expert has identified a couple of vulnerabilities in Data Manager, a web-based SCADA monitoring system made by energy Read more about Vulnerabilities Found in Several SCADA Products[…]
Russian Speaking “Turla” Cyber-espionage Group Exploits Satellites to Reach the Ultimate Level of Anonymity: Kaspersky Lab A group of Russian-speaking threat actors that have been active for more than 10 years have been hijacking satellite-based Internet links as a tactic to hide their whereabouts, Kaspersky Lab said Wednesday. Known as the Turla cyber-espionage group (also Read more about Russian-Speaking Turla Attackers Hijacking Satellite Internet Links[…]