The Challenge A retail client requested our assistance to identify an individual, who was also a paying customer, who wrote a python script that scraped a backend server. The customer had also previously published a WiFi vulnerability present at the company’s offices...
Outside Intel
Preventing Corporate Sabotage by a High-Level Executive
The Challenge The CEO of a multinational manufacturer (Client) identified an urgent need to remove a key executive, along with several accomplices, from the operations of the company, based on concerns that these insiders were intent on sabotaging the company. Given...
Preventing the Exfiltration of PII from a Malicious Administrator
The ChallengeA major pharmaceutical company (Client) made the decision to terminate an administrator and was concerned about the malicious exfiltration of personally identifiable information (PII) before his termination. Why Nisos The administrator was being...
Investigating a Destructive Administrator Following Merger and Acquisition
The Challenge A global manufacturing company (the Client) experienced a corporate-wide outage due to being locked out of their router devices between corporate headquarters and their branch offices across the globe. After internal investigation and significant...
Countering Destruction to Save a Business
The Challenge A healthcare technology company (the Client) suffered a wide-scale destructive compromise after an attacker targeted the Client’s backend point of sale technology and deleted all customer data. Why Nisos In addition to the primary forensics firm that was...
DDOS Investigation Leads to Much Greater Network Security Bolstering
The Challenge A multinational manufacturer (The Client) needed assistance investigating a large-scale distributed denial of service (DDOS) attack against several publicly accessible websites and applications. In the course of the attribution investigation, we detected...
Investigating a DDOS Attack
The Challenge A global consultancy (The Client) experienced network outages resulting from a large-scale Distributed Denial of Service (DDOS) attack against their Domain Name Service (DNS) servers. Why Nisos The Client engaged Nisos to leverage our access to external...
Countering APTs, Ensuring M&A Standards Through Threat Hunting
The Challenge A global retailer’s (the Client) peers were attacked with customized ransomware and the retailer’s subsidiaries were being targeted with customized phishing attempts. Why Nisos Out of concern that a subsidiary could be targeted by a similar ransomware...
Threat Intelligence to Remediate Platform Abuse
The Challenge A publicly traded technology company (the Client) with thousands of global employees maintains a premier business unit application platform regularly abused by eCrime and cyber espionage actors. The Client requested Nisos’ expertise in threat...
Insider Threat: Preventing Destruction During M&A Activity
The Challenge A global technology company (the Client) was in the process of divesting a previous acquisition. Upon learning of the divestiture plan , the key executives at the acquisition company threatened to destroy corporate infrastructure if the company was not...
Third Party Risk Management: Investigating a Leak of Sensitive Data from a Customer
The Challenge A global data and infrastructure provider (The Client) determined a very tightly controlled database was for sale on the dark web. The Client discovered this database was being sold on criminal forums and needed to attribute the seller and the source of...
Actively Countering Advanced Persistent Threats with External Telemetry
The Challenge A technology company (the Client) with thousands of employees across the globe was under attack by a nation-state level adversary. They requested Nisos’ assistance to provide critical intelligence to detect indicators and respond to the attack. Given the...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.