Blog Spotlight

todayMay 7, 2021

Cyber security + Service Line + MDR Daniel West

Post SUNBURST MDR, Zero Trust, and Deconfliction within the Supply Chain – A Case Example of a Broken Process

On April 22, 2021, many SOC’s and MDR services were going about their normal day-to-day operations, when some of us across the community received an alert from our EDR platforms for some or all the following Dell binaries: Filename MD5 Hash SHA-1 Hash SHA-256 Hash VirusTotal Dsapi.exe  52fdd8a255fd3d57b8ba3bb238306a32  90f76ea1907192720ec6a85301b0656004de78e6  9ae19f49304fbd27cf07a76e861f3288165bc809de20e32dd8f2dddda59066af  [...]

Top Voted Blog Posts
Sorry, there is nothing for the moment.

Cloud Native Security Operations

SOCaaS (SOC-as-a-Service)

We employ the top talent in the industry, providing cutting-edge security solutions, and using defensive countermeasures to combat the growing threat landscape.



Full spectrum SOCaaS - 360° Protection

We are the first full-spectrum MSSP offering on the market, providing services from risk assessments to on-net hunt operations.


Redefine What Your MSSP Can Do For You

We have designed our service around a full security suite of offerings because we understand that a holistic security approach is needed today.

Software Supply Chain Cybersecurity

Software Supply Chain Cybersecurity

Obscurity Labs has been performing R&D in the Software Supply Chain Security field since early 2018.

More Info
Software Supply Chain Cybersecurity


SOC Immersion Training™ (SIT)™

SOC Immersion Training™ (SIT)™ embeds our offensive operators inside a virtual lab environment alongside your SOC analysts to enhance your team’s operational skills and improve their ability to prevent, detect, and respond to specific threat actor TTPs. We also offer Cyber Threat Emulation (CTE) training.

Upcoming Training
SOC Immersion Training™ (SIT)™

SOCaaS (SOC as a Service)

Fully Managed Protection From The Top Talent In the Industry.
Bet On Us To Win.

Obscurity Labs understands the complexities of organizational security operations. We provide our security services as a collaborative process, working closely with our customers to establish a strong foundation that enables us to mature their Security Operations Program while forging trust and an enduring relationship between our organizations.

check 24x7 Threat Monitoring

check Fully Managed On-Prem & Cloud Security Architecture

check Fully Managed On-Prem & Cloud Security Devices

check Tier 1, 2 & 3 Threat Analysis

check Managed Endpoint Security

check SOC Portal, Ticket Management & Reporting

check Cloud Native SIEM, Threat Detection, Steam Data Processing & ML / Behavior Profiling