Incident Response
Rapid on-site deployment and remote response and mitigation of computer security incidents.
European Cybersecurity Company.
Threat Intelligence. Incident Response. Cyber Advisory.
Generation of new knowledge on cybersecurity incidents, vulnerabilities and malware, development of specialized tools for prevention, detection and response.
Ethical hacking, cyber intelligence, technical assessment and hardening of infrastructure and information systems, governance, risk management and compliance, trainings and exercises.
Cybersecurity incident response, acquisition of digital evidence, digital forensics and court expert witness services. Malware analysis, malware vaccines development and cyber counterintelligence.
IstroSec is an ethical company that conducts its business activities honestly, apolitically, directly and fairly to all parties involved.
To be an international leader in research, development and cyber security services and deliver strong, innovative and effective solutions to tackle cybersecurity challenges.
Our goal is to offer quality professional services to our customers at a reasonable price and to continuously increase our customer’s security resilience.
We have a track record of hundreds of incident response engagements, including APT groups, our own CVEs and countless pentests, malware analyses and trainings.
Our customers are SMEs, corporations, Fortune 500 companies and governmental entities across all industries which take cyber security very seriously.
Rapid on-site deployment and remote response and mitigation of computer security incidents.
Vulnerability Assessment, Penetration Testing, Red Team and Purple Team Engagements.
Active hunting for threats in infrastructure based on TTPs and searching for indicators of compromise.
Data Leaks Searches and Analysis, ClearWeb, DeepWeb, DarkWeb.
SOC Level 3+, administration and optimization of EDR, SIEM, SOAR and other cybersecurity technologies.
Acquisition of digital evidence, investigation, and reconstruction of security events and incidents. Processing of expert testimonies.
Analysis of properties, functionality, origin, potential impacts of malicious code, and reverse engineering.
Phishing, Spearphishing, Whaling. Custom Scenarios incl. Custom “Malware”. Simulation of advanced attacks and APT.
Audits and Implementations of Security Frameworks, vCISO. Technical Audits and Hardening.
Trainings for personnel, IT professionals and management. Tabletop exercises and drills.
Assessment of adequacy of processes and technology for swift and effective reaction.
Full array of CSIRT services, including 24/7 DFIR and proactive security.
Strong, innovative, multi-disciplinary team of experts, ethical hackers, incident responders and consultants with long-standing experience.
GIAC Certified Forensic Examiner
GIAC Certified Forensic Analyst
GIAC Cloud Penetration Tester
GIAC Exploit Researcher and Advanced Penetration Tester
Certified Information Systems Auditor
Certified in Risk and Information Systems Control
Certified Information Systems Security Professional
Advanced Windows Security Course Certified Security Professional
Offensive Security Certified Professional
Offensive Security Wireless Professional
Certified Red Team Professional
Certified Red Team Expert
Certified Ethical Hacker
Cisco Certified Network Associate
NATO Cooperative Cyber Defence Centre of Excellence
Mobile Threats & Incident Handling; Digital forensics; Artefact Analysis
Trusted Introducer
Azure Security Engineer Associate
CrowdStrike Certified Falcon Administrator
CrowdStrike Certified Falcon Responder
CrowdStrike Certified Falcon Hunter
Introduction Windows 10 Timeline is a relatively new forensic artefact, which was introduced in Windows 10 version 1803.
Since Microsoft published a new RCE vulnerability in Microsoft Windows Media Foundation discovered by us, we would also like to share full list of vulnerabilities we have discovered.
Standard remote shells like SSH require that the target machine needs to be visible over the network.