Skip to content

Continuous Automated Red Teaming (CART)

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass has recently secured a patent from the United States Patent and Trademark Office (USPTO) for their innovative approach to Automated Red Teaming in Organizational Networks. This milestone is set to reshape the landscape of cybersecurity, particularly in the realms of Automated Pen testing and Red Teaming. The minds behind this revolutionary technology are Arnab… Read More »FireCompass Secures USPTO Patent for Automated Red Teaming

Importance of GitHub Reconnaissance in CASM & CART

GitHub reconnaissance is an important aspect of attack surface management, particularly for organizations and individuals who rely heavily on software development and open-source code. Here’s why it is crucial: Discovery of Sensitive Information Developers sometimes inadvertently push sensitive information e.g. hardcoded credentials, API keys, access tokens and Configuration Files containing sensitive information Identification of Security… Read More »Importance of GitHub Reconnaissance in CASM & CART

Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

In the ever-evolving landscape of digital connectivity and technology, organizations face an incessant challenge to fortify their cyber defenses against an ever-expanding array of threats. The rapid advancement of information technology has brought about unparalleled convenience and efficiency, but it has also ushered in an era where the vulnerability of digital ecosystems is a constant… Read More »Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Google Dorking for Continuous Attack Surface Management

Google Dorking, also known as Google hacking, is a technique where advanced search operators are used to find specific information on search engines. It involves crafting search queries to discover vulnerable or exposed data on the internet. Attack surface management involves identifying and securing all possible entry points into an organization’s systems and networks. It… Read More »Google Dorking for Continuous Attack Surface Management