Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

RedTeam Security Presented At HTCIA 2015

HTCIA 2015

RedTeam Security’s Jeremiah Talamantes just recently presented at the High Tech Crime Investigation Association (HTCIA) International Conference & Training Expo 2015 last month. The conference attracts digital forensics, law enforcement, security experts and military from the US, Canada, Europe, Latin America and Asia. RedTeam was extremely pleased to have had the privilege to speak about a security research project called the PlugBot Project, that explores the concept of a hardware botnet.

PlugBot project is a security research project by RedTeam Security, led by Jeremiah Talamantes. It is designed to be a proof-of-concept / experimental foray into the development of software that could potentially support the concept of a hardware botnet.

The hardware component to this project is intended to be single-board computers, such as: Raspberry Pi, Beaglebone, Cubox, etc. Jeremiah began developing the concept in February 2010 right around the initial surge of plug computers into the tech market. Although the development ceased not soon after, the research aspect continued into his dissertation and finally came to life again in early 2015. The code will become publicly available and under open source licensing. Please sign up for our Labs newsletter for notifications.

10-Point Offensive Security Checklist

Get A Bird's Eye View Of Your Organization's Security Readiness

Services Datasheet

Recent Posts

Featured On

National TV news and media outlets often consult with us for our expertise as a
boutique, high-touch ethical hacking firm highly trained in a narrow field of cyber
security. Please click on any logo below to view the featured story.