Full Spectrum Attack Simulation
Lost Rabbit Labs seeks to deliver high quality actionable intelligence through focused collaborative teaming efforts. By offering ‘Full Spectrum Teaming’, and partnering with our clients, we can more efficiently identify and help remediate discovered vulnerabilities, weaknesses, and un-intended disclosures.
Working as a team and providing real-time information sharing often increases the quality of an engagement and yields the best deliverables. Other times you need a covert, adversarial scenario tested and explored. Lost Rabbit Labs will work with your team in the way you need, and provide full methodologies and results, to help you increase your security posture.
- Collaborative Teaming
- Adversarial Scenarios
- Covert/Overt Teaming
- Best-Practices vs. Compliance
With the average financial cost of data breaches nearing roughly $3.8 million, the human security layer must be able to identify and withstand phishing attempts of all types. Our security team can attempt to impersonate employees, vendors, and more to try to spear phish high-value individuals and infiltrate your network, in order to test your policies.
- Spear Phishing
- Email, Phone, & Video Impersonation
- Whaling
- Waterhole Attacks
Does your organization need to test the physical security or perimeter of its offices? Knowing how your defenses would hold up in the event of an actual attack can greatly help improve your overall security posture. Using Social Engineering tactics, various forms of Asset Manipulation, USB drops, lock-picking, impersonation, and more, Lost Rabbit Labs can help you identify weakness before the real threats do.
- Physical Assessment Testing
- Social Engineering Tactics
- Asset Manipulation
- Rogue Device Installations
In 2019, there were roughly 151.9 million ransomware attacks that took place around the world. Having your digital assets taken hostage is one of the most devastating experiences you can go through as an organization. Our ‘Strategic Security Team’ can assist your company with prevention, identification, and resolution during and post-event.
- Threat Identification
- Response Training
- Reducing Risk & Impact
- Infrastructure Security Analysis
Consulting & Training Services
Through decades of combined experience in information, system and network security, Lost Rabbit Labs offers a wide range of consulting services to assist your organization. Whether the need is Offensive or Defensive, our Security Team is ready to provide knowledge, resources, and expert advice to your teams.
From covering basic concepts, to having in-depth discussions on tools, methodologies, and best security practices, our Security Team can help your organization evolve its security posturing and increase knowledge and awareness around topics of your choosing.
- Identifying a Phishing Campaign
- Fundamental Security Knowledge
- Digital Asset Protection
- Offensive/Defense Techniques
Our Security Team will inspect your source code and use dynamic testing techniques searching for vulnerabilities and weaknesses within your code base. Weak cryptography, insecure functions and methods, unauthenticated communications, improper storage of credentials, along with other vulnerabilities will be tested.
- Web & Client Application
- API & Endpoint
- DoS & Injection Identification
- Weak Code Function Detection
A good Incident Response team can help save your organization from prolonged downtime, wasted resources and needless panicking. Our Security Team is well versed in threat, malware, and forensics analysis, along with remediation techniques associated with commonly used attack vectors.
- Threat, Malware & Forensics Analysis
- Binary Analysis
- Reverse Engineering
- Log Ingestion/Parsing
Organizations that handle personal, health, and financial data are required to have strong policies geared towards asset management and protection. All businesses need to know how to handle an incident, event, breach, or even a simple phishing email properly. Having organized Policies and Procedures in place can help create a more secure environment for your employees and customers data.
- VCISO Support
- Policy Review
- Beyond Best Practices
- Firewall/Netflow Review
- Log Retention & Analysis