Customized Development
In many cases, a close-to-real cyber-attacks is necessary. Some use-cases may regard product piloting, assessment or calibrating, while others may regard field-testing new features of products and services.
Cipher Security offers a unique development service that perfectly mimics malicious hacker activity.
This unique service allows information security hardware vendors, service providers or cyber security startups to create better products and offer more reliable services, as a result of testing against almost-real threats in a safe and familiar environment.
Cipher Security provides a vast portfolio of attacks, from malicious behavior and evasive communicating components, to SCADA attacks and HMI manipulation. We have performed dozens of successful projects and stand ready for any new and exciting challenges.
Recent Projects
- Developed an evasive remote access tool for a proxy vendor, who used the special tool to test and harden their entire product line and to establish a strong advantage over competition
- Generated controlled malicious hacker activity for a Network Behavior Anomaly Detection appliance vendor, who used our white-hat activity to harden and improve their appliance
- Simulated a series of scaled and highly-evasive DDoS attacks for an anti-DDoS appliance vendor, who is using these attacks as a high-level QA process and a basis for developing new products
- Programmed customized SCADA and PLC manipulation attacks for a cyber-training facility establishment
- Created HMI attacks displaying bogus data for a cyber-training facility establishment
We are excited to engage in new challenges! Feel free to contact us with any questions.
Contact us