Russia, Moscow 1/1 Vasilisa Kozhina Str.,
Business center Park Pobedy
We determine the presence or absence of infrastructure compromise by retrospectively searching for corresponding indicators and other signs of malicious activity.
We provide a detailed report upon completion of the work that includes:
• The company's threat landscape
• A complete list of hypotheses which will be used for the search for tactics, techniques, and procedures of a potential attacker
• Results of the analysis of collected data, as well as the monitoring telemetry from the workstations and servers where EDR agents were installed
• If any suspicious or malicious activity is detected – an investigation report that contains reconstructed incident timeline
• Recommendations for the infrastructure hardening and improving the incident response readiness that contains remediation and mitigation recommendations
We propose: • Collection of forensically significant data from endpoints and their retrospective analysis • Organization of real-time device monitoring using EDR during the work period • Collection and retrospective analysis of network interaction data • Analysis of system logs • Analysis of logs from perimeter application systems • Identification of external assets, including shadow infrastructure • Search for data leaks in surface, deep and dark web segments of the Internet • Search for websites/domains using the company's brand attributes • Monitoring social media and messaging platforms for accounts/posts using brand attributes • Monitoring the publication of sensitive information on recruitment platforms or in the media
Let’s talk how to improve the security and efficiency of your IT and cyber security systems.