Know the players in Cyber: how little we know about the leaders of our cyber adversaries

By |2022-12-07T19:05:34-05:00December 7th, 2022|Categories: Creative, Cyber, Events, Networking, Reports, Survey|Tags: , , , , , |

During HammerCon 2022, we ran a timed 60-second 5 question quiz to determine which country was the biggest threat in Cyber. We created adaptive questions sets that would correspond to selections, and we were not surprised by the outcome. The quiz ran for 4 days, had 162 unique partial submissions and 47 complete submissions. Quiz Days [...]

Comments Off on Know the players in Cyber: how little we know about the leaders of our cyber adversaries

Malware analysis workshop at AvengerCon VII

By |2022-12-05T10:15:54-05:00December 5th, 2022|Categories: Automation, Containers, Cyber, Defensive Methodology, Hunting, Training|Tags: , , , , |

Our President, Jose Fernandez, ran a malware analysis workshop using containers during AvengerCon VII. The event, hosted at Dreamport in Columbia, MD allowed participants to use Kleared4, our disassociated cyber-range, to safely analyze and triage malware samples in a controlled environment. Participants analyzed ransomware samples, and random samples in both Linux and Windows containers. If you [...]

Comments Off on Malware analysis workshop at AvengerCon VII

Autodyne: Automated firmadyne for firmware emulation

By |2022-12-04T16:21:19-05:00December 4th, 2022|Categories: Automation, Containers, Cyber, emulation, firmware, Scripts|Tags: , , , , , |

Emulate device firmware using containers with Autodyne. We crossed 2k pulls on dockerhub! Our CI pipeline for daily updated images for ubuntu 18 / ubuntu 20 has been growing strong since we open-sourced the images. Daily Docker images: https://hub.docker.com/r/compsecdirect/autodyne Check out our Github project and please submit issues related the tool there: https://github.com/compsecdirect/autodyne

Comments Off on Autodyne: Automated firmadyne for firmware emulation

CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

By |2022-12-05T10:24:21-05:00August 18th, 2022|Categories: Contracts, Cyber, Defensive Methodology, Design, firmware, News, Partnerships|Tags: , , , , , |

CompSec Direct is Microsoft approved for firmware analysis. This is a new partner specialization within the Defender for IoT ecosystem of Microsoft's security portfolio. We can help your organization find vulnerabilities within your IoT devices and prioritize changes to ensure resilience within your IoT equipment. Contact us at info@compsecdirect.com for more details.

Comments Off on CompSec Direct recognized by Microsoft with Firmware analysis partner specialization

CompSec Direct is a 2022 VIP Start graduate from the National Veteran Institute For Procurement

By |2022-12-05T10:25:16-05:00February 28th, 2022|Categories: Contracts, Networking, News|Tags: , , , |

We graduated from VIP Start! This is a 4-month program to help small veteran-owned business with government contracting, procurement and growth for small SDVOSB, 8A companies, minority owned companies. If you are a veteran and a business owner, we highly encourage you to apply for one of their courses. https://nationalvip.org/programs/vip-start/

Comments Off on CompSec Direct is a 2022 VIP Start graduate from the National Veteran Institute For Procurement

Kleared4 closed-operation fly-away edge kit

By |2022-06-14T23:15:09-04:00June 7th, 2021|Categories: Automation, Cyber, Defensive Methodology, Design, Forensic, Hacking, Hunting, Incident Response, Networking|Tags: , , , , |

Kleared4 closed-operation fly-away edge kit

Comments Off on Kleared4 closed-operation fly-away edge kit

Case 1

By |2022-06-15T01:30:31-04:00August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: , , , , |

Case 1. If you like the case study, hit us up and let us know. Take care. Malware Analysis on Hybrid-Analysis. case1Download

Comments Off on Case 1

NTT Group Global Threat Intelligence Report 2016

By |2022-06-15T00:50:38-04:00October 19th, 2016|Categories: Cyber, Defensive Methodology, Forensic, Reports|Tags: , , , , , , |

GTIR 2016 NTT Group published a great threat report for 2016. Quality publication and definitely worth while. Good for CISO’s and Info Sec pros alike. Although some of the areas in the Key Findings are questionable given that we recently saw DDoS attacks above 1Tbs , other areas highlight recent trends that ultimately affect all of [...]

Comments Off on NTT Group Global Threat Intelligence Report 2016

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

By |2022-06-15T00:53:53-04:00October 7th, 2016|Categories: Cyber, Demo, Pen-testing, Training|Tags: , , , , |

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files in conjunction with the Shodan api in python to search for associations between different different fields. Using this tool reduces initial [...]

Comments Off on CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico