Security Intelligence
Decade-old vulnerability in Cisco ASA WebVPN recently exploited
Cisco warns a decade-old vulnerability in its Adaptive Security Appliance (ASA) is being exploited by threat actors.
Digital Forensics & Incident Response Services
Focus on your business while our team investigates, analyzes, and contains the threat.
Field Effect incident response services help you navigate your breach with an accelerated, effective response that gets you back to business fast—no matter the type of incident.
ANALYZE
CONTAIN
RECOVER
News & Intel
Security Intelligence
Cisco warns a decade-old vulnerability in its Adaptive Security Appliance (ASA) is being exploited by threat actors.
Security Intelligence
Rockstar 2FA, a new phishing-as-a-service (PhaaS) platform, observed targeting Microsoft 365 user accounts with...
Security Intelligence
Unnamed threat actors observed using a new attack vector that leverages intentionally corrupted Word documents to evade...
DIGITAL FORENSICS AND INCIDENT RESPONSE
Our team works with you to quickly determine the right IR package depending on initial containment steps, type of incident, and business needs.
All IR packages include proper investigation and reporting, and 90 days of Field Effect MDR to prevent repeat attacks.
Experienced incident response
Field Effect’s incident response team has helped businesses recover quickly from various cyberattacks.
Ransomware is a type of malware that encrypts and locks up a victim's machine, offering to restore access if the victim pays the attackers a fee. Ransomware attacks are increasingly commonplace and continue to plague businesses of all sizes.
Our team works to pinpoint root cause, determine what actions the threat actor took, and look for evidence of leaked intellectual property or personally identifiable information.
Malware, short for malicious software, is a type of computer program designed to damage and destroy computers or computer systems. Malware may disrupt normal operations, leak private information, provide attackers with unauthorized access to data or systems, or even delete private information.
Our team determines how long malware was present on the network, identifies the initial point of access, determines the scope of the compromise and identifies the threat actor’s goal, such as stealing data or hijacking system resources.
Business email compromise (BEC) is a social engineering scam where attackers compromise the email account of someone within an organization, usually an executive (hence why it is also known as “CEO fraud”). BEC typically relies on phishing to extract email credentials.
Our team investigates to explain the source of the compromise, determine what data was accessed, and identify evidence of financial fraud attempts.
Insider threats are cybersecurity vulnerabilities that originate from within an organization's network or from a staff member. Insider threats may be malicious, such as a disgruntled employee copying data to sell or expose it, or they may be accidental, resulting from vulnerabilities in the digital supply chain or a misconfigured system.
Our team identifies anomalies in user behaviour—such as accessing sensitive files outside working hours—pinpoints recently accessed or modified files, and identifies evidence of malicious software such as keyloggers, remote access utilities, or data exfiltration utilities.
PROFESSIONAL SERVICES
Our team of experienced cybersecurity professionals will help you:
Get Started
Businesses of all sizes should have access to world-class cybersecurity. With Field Effect, they do.
Get a demo