We obviously take privacy and confidentiality extremely seriously. So, while we think you’ll find these case studies useful, there’s only so much detail we can go into. And, of course, we can’t name any names. No matter how big they are.
Alice (and Bob) in Blunderland
Two of our ethical hackers exploited what is arguably the most vulnerable component of any organization. Its people. Read how…
Taking Privilege to Another Level
See how, in only a matter of hours and entirely unnoticed, we used multiple steps to gain network access and…
The Luxembourg Job
Discover how a combined physical and social attack a single member of our Swarm exposed network and process vulnerabilities.