Blog Spotlight

todayDecember 17, 2021

Cyber security + Software Supply Chain Cybersecurity Shawn McManus

Log4shell – the newest vulnerability

Introduction On Thursday, December 9th, the vulnerability CVE-2021-44228 known as “Log4shell” was made public, sending large companies such as Twitter, Amazon, Google, Cloudflare, and many others in a rush to patch it before any damage could be done. Not only are large companies affected, but many applications and servers utilizing [...]

Top Voted Blog Posts
Sorry, there is nothing for the moment.

Cloud Native Security Operations

SOCaaS (SOC-as-a-Service)

We employ the top talent in the industry, providing cutting-edge security solutions, and using defensive countermeasures to combat the growing threat landscape.

DOWNLOAD BROCHURE


DEFENSIVE SERVICES

Full spectrum SOCaaS - 360° Protection

We are the first full-spectrum MSSP offering on the market, providing services from risk assessments to on-net hunt operations.




SECURITY SERVICES

Redefine What Your MSSP Can Do For You

We have designed our service around a full security suite of offerings because we understand that a holistic security approach is needed today.



Software Supply Chain Cybersecurity

Software Supply Chain Cybersecurity

Obscurity Labs has been performing R&D in the Software Supply Chain Security field since early 2018.

More Info
Software Supply Chain Cybersecurity
Background

Training

SOC Immersion Training™ (SIT)™

SOC Immersion Training™ (SIT)™ embeds our offensive operators inside a virtual lab environment alongside your SOC analysts to enhance your team’s operational skills and improve their ability to prevent, detect, and respond to specific threat actor TTPs. We also offer Cyber Threat Emulation (CTE) training.

Upcoming Training
SOC Immersion Training™ (SIT)™
Background

SOCaaS (SOC as a Service)

Fully Managed Protection From The Top Talent In the Industry.
Bet On Us To Win.

Obscurity Labs understands the complexities of organizational security operations. We provide our security services as a collaborative process, working closely with our customers to establish a strong foundation that enables us to mature their Security Operations Program while forging trust and an enduring relationship between our organizations.

check 24x7 Threat Monitoring

check Fully Managed On-Prem & Cloud Security Architecture

check Fully Managed On-Prem & Cloud Security Devices

check Tier 1, 2 & 3 Threat Analysis

check Managed Endpoint Security

check SOC Portal, Ticket Management & Reporting

check Cloud Native SIEM, Threat Detection, Steam Data Processing & ML / Behavior Profiling