Skip to main content
Call (952) 836-2770
free consultation - Research
Free Consultation
Free Consultation
Home
Services
Penetration Testing
Network Penetration Testing
Web Application Penetration Testing
Wireless Penetration Testing
Mobile Application Penetration Testing
Amazon Web Services (AWS) Penetration Testing
API Penetration Testing
Physical Penetration Testing
Social Engineering
Physical Social Engineering
Email Phishing
Employee Awareness Training Services
Cloud Security
Advanced Penetration Testing
Advanced Adversary Simulation
Red Teaming
View All Services
Resources
FAQs
Frequently Asked Questions
Knowledge Base
Discover our research
Blog
Read cybersecurity topics
Terms Glossary
Define infosec threats
Resource Library
Access guides, checklists, e-books, and briefs
Company
Team
Meet our team
Certifications
View our qualifications
Case Studies
Learn how we help
Methodology
Comprehensive, risk-based methodology
Reviews
Hear what our clients are saying
Deliverables
Know what to expect
About Us
History of our organization
News and Features
See us in action
Industries
Compliance
HIPAA
GDPR
PCI DSS
NERC CIP
FDIC
FTC
Compliance Overview
Compliance Overview
Contact
Schedule Consultation
Meet with a Security Expert
Get a Quote
Request a Customized Proposal
Become a Partner
Join our Partner Program
LET'S CONNECT
Get a Quote
Get a Quote
Home
Research
InfoSec Research Knowledge Base
Advancement through research and innovation, keeping our minds fresh and helping the infosec community at large.
Interview with CSO Online – The Mirai Botnet, Dyn DNS, And IoT Security
Interview with CSO Online – The Mirai Botnet, Dyn DNS, And IoT Security
Real-Life Encounters of Physical Pen Testers Produce Valuable Outcomes
Real-Life Encounters of Physical Pen Testers Produce Valuable Outcomes
Netflix And Hacking Threats in The Entertainment Industry? Kurt Speaks With Cheddar TV
Netflix And Hacking Threats in The Entertainment Industry? Kurt Speaks With Cheddar TV
Tech Insider Interview: How To Covertly Steal And Clone RFID Badges
Tech Insider Interview: How To Covertly Steal And Clone RFID Badges
RedTeam Security Book Makes Top 10 Must-Reads By TechWorm
RedTeam Security Book Makes Top 10 Must-Reads By TechWorm
API Enumeration with RedTeam Security’s Tool: pURL
API Enumeration with RedTeam Security’s Tool: pURL
The Evil SVG Project
The Evil SVG Project
The Social Engineer's Playbook: A Practical Guide to Pretexting
The Social Engineer's Playbook: A Practical Guide to Pretexting
The PlugBot: Hardware Botnet Research Project
The PlugBot: Hardware Botnet Research Project
Exploring the Exploitation of the Java Debug Wire Protocol
Exploring the Exploitation of the Java Debug Wire Protocol
AutoNessus
AutoNessus
Antivirus Bypass Techniques with Ntlmrelayx
Antivirus Bypass Techniques with Ntlmrelayx
A Guide to Kerberoasting
A Guide to Kerberoasting
Contact Us
close