Private Bank
Scenario-based red teaming attacks agains a custody platform for crypto currencies
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Scenario-based red teaming attacks agains a custody platform for crypto currencies
Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network
Red Teaming: comprehensive attack simulation from the perspective of an external attacker with the goal to gain access using social engineering attacks and further infiltrate the internal network
Red Teaming Assessment with OSINT collection, phishing emails, analysis of the internal attack surface and search for critical vulnerabilities as well as lateral movement in the internal network
Red teaming and architecture review with the goal of compromising the backup infrastructure and testing its resilience against a targeted attack
Security audit of several aspects of a system landscape through WLAN auditing, a penetration test of the cash registers, an architecture review and social hacking as well as conducting an attack simulation
Red Teaming: comprehensive attack simulation from the perspective of a compromised employee and an attacker with access to the internal network
Red Teaming: comprehensive attack simulation from the perspective of a compromised employee as well as an attacker with access to the internal network
Red Teaming: comprehensive attack simulation from the perspective of a compromised employee as well as an attacker with access to the internal network
Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network
Comprehensive penetration test including wardriving, WLAN audit and Red Teaming; The network infrastructure was examined by means of a remote and internal security scan, a Wardriving and WLAN-Audit at one location and a Red Teaming
Comprehensive audit of a network control environment, incl. technical tests of servers and devices in a substation, analysis of network traffic and review of the firewall rules
Awareness trainings for IT managers and simulation of a phishing campaign over 30 companies
Red Teaming: Comprehensive attack simulation to check the implemented protective measures and the employee reaction
Red Teaming: Comprehensive attack simulation from the point of view of a compromised employee as well as an attacker with access to the internal network
Red Teaming: Comprehensive attack simulation to check the implemented protective measures and the employee reaction
Red Teaming from the point of view of a through phishing compromised employee as well as an attacker in the internal network
Red Teaming: comprehensive attack simulation to evaluate the implemented protection measures as well as the reactivity of the SOC and physical social engineering at two locations
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: