Blog Spotlight

todayJuly 9, 2021

Cyber security + Software Supply Chain Cybersecurity Daniel West

Software Supply Chain Targeting – Who Will The APTs Target Next?

Introduction After I saw the buzz about Kaseya on July 2nd, I decided it was time to start writing a blog post about targeting the supply chain.  Software supply chain “attacks” aren’t new, however, they will become much more mainstream now that there has been extended media coverage of the SolarWinds incident. You may have noticed a similar [...]

Top Voted Blog Posts
Sorry, there is nothing for the moment.

Cloud Native Security Operations

SOCaaS (SOC-as-a-Service)

We employ the top talent in the industry, providing cutting-edge security solutions, and using defensive countermeasures to combat the growing threat landscape.



Full spectrum SOCaaS - 360° Protection

We are the first full-spectrum MSSP offering on the market, providing services from risk assessments to on-net hunt operations.


Redefine What Your MSSP Can Do For You

We have designed our service around a full security suite of offerings because we understand that a holistic security approach is needed today.

Software Supply Chain Cybersecurity

Software Supply Chain Cybersecurity

Obscurity Labs has been performing R&D in the Software Supply Chain Security field since early 2018.

More Info
Software Supply Chain Cybersecurity


SOC Immersion Training™ (SIT)™

SOC Immersion Training™ (SIT)™ embeds our offensive operators inside a virtual lab environment alongside your SOC analysts to enhance your team’s operational skills and improve their ability to prevent, detect, and respond to specific threat actor TTPs. We also offer Cyber Threat Emulation (CTE) training.

Upcoming Training
SOC Immersion Training™ (SIT)™

SOCaaS (SOC as a Service)

Fully Managed Protection From The Top Talent In the Industry.
Bet On Us To Win.

Obscurity Labs understands the complexities of organizational security operations. We provide our security services as a collaborative process, working closely with our customers to establish a strong foundation that enables us to mature their Security Operations Program while forging trust and an enduring relationship between our organizations.

check 24x7 Threat Monitoring

check Fully Managed On-Prem & Cloud Security Architecture

check Fully Managed On-Prem & Cloud Security Devices

check Tier 1, 2 & 3 Threat Analysis

check Managed Endpoint Security

check SOC Portal, Ticket Management & Reporting

check Cloud Native SIEM, Threat Detection, Steam Data Processing & ML / Behavior Profiling