We use an offense security mindset to simulate your adversary and implement solutions and strategies that work.
We perform reconnaissance to discover vulnerabilities in personnel, processes, and technology.
We leverage exploitable vulnerabilities to move silently across the network and test implemented technologies.
We regroup after assessments to discuss findings along with remediation steps as a team.
Leap Security's client base has grown steadily since our launch thanks to word of mouth recommendations. Our succcess is based on our ability to customize assessments, be agile, and technical expertise. Our clients range from startups to Fortune 10 across all industries.
Welcome Welcome to the inaugural Leap Security CTF competition. The CTF is a global competition created with the goal of giving back to the community. To make this all happen, we’ve teamed up with the guys at 0x00sec! The CTF will have no limitations on participants, it is open to anyone — think of it…read more
The Vulnerability A vulnerability present in libssh versions 0.6 and later has taken the internet by storm. The vulnerability allows attackers to bypass authentication and gain remote code execution on the affected system. The libssh team has already released a patch to this vulnerability (link below). Upgrading to 0.7.6 or 0.8.4 eliminates the vulnerability. Link:…read more