All our experts have the following credentials:
We use professional, commercial DFIR (Digital Forensics and Incident Response) tools and best practices in our operations.
Team ready 24/7 to respond immediately to cyber security incidents.
We conduct operations both remotely and at the scene of the incident to ensure a quick and effective response.
We secure and analyze logs using data processing tools to identify attack vectors and effects.
We analyze the operating memory and disks of the systems to identify digital traces of the incident and determine the full course of events.
We use specialized tools, such as write-blockers and disk cloning devices, to protect digital evidence.
We perform reverse analysis of malicious code and use CTI and OSINT intelligence to understand the source and nature of threats.
We document every step of the incident response and prepare a detailed post-intrusion report for better analysis and future-proofing.
We provide assistance with law enforcement and CERT teams, attend meetings and prepare evidence.
We lead and coordinate technical activities, supporting the customer in restoring and recovering systems to normal operation.