About us

SECFORCE is a cybersecurity consultancy, specialized in offensive security assessments offering both Consulting and Testing Assurance services.

Certified Excellence

Crest
Crest-VA
Pen-Test
CBEST
TIBER
TIBER
TIBER

Security is one of the biggest priorities for organisations today.

The threats are real, constant and ever-changing. This is no time to compromise your security.

That is why some of the world’s leading organisations trust Secforce to test their systems, upgrade their security programmes and comply with their regulations.

We are a team of exceptional security consultants, with the knowledge and insight to identify vulnerabilities and help you secure your systems.

Our Testing Services

Penetration Testing

The key to an effective penetration test is not simply to identify weaknesses; it is critical to explore these weaknesses to understand the real threat risk for any organisation.

Learn more

Adversary Simulation

The real value of a Targeted Attack Simulation stems from its adoption of the ‘assume breach’ mindset. This makes it possible to assess the effectiveness of an organisation’s s…

Learn more

Our Consulting Services

Penetration Testing Maturity

Penetration Testing Maturity

A holistic review of your testing programme aimed to understand its effectiveness and provide the advice and approach to maximise your results and enhance your security posture.

Learn more
DORA Compliance

DORA Compliance

An end-to-end solution providing the necessary consulting capabilities, our proven track record of technical expertise and partnerships to cover all the DORA requirements.

Learn more

Discover our uncompromising commitment to quality

About us

Case Studies

Cybereason, last line of defence
See all cases
How Nedbank mitigates cyber attacks
See all cases

The Lab

April 22, 2024

CVE-2023-26465 - Breaking Through XSS Filters in Pega Platform

Take a look at how we managed to break through XSS filters using Markdown-nesting and user mentioning functionalities in Pega Platform

See more
June 6, 2023

Size matters! When capital letters introduce vulnerabilities

Microsoft Dynamics 365 Rich Text Editor XSS

See more
Jan. 19, 2023

AWS Cognito pitfalls: Default settings attackers love (and you should know about)

Diving into some common, but sometimes overlooked, AWS Cognito misconfigurations.

See more

The Blog

March 19, 2025

Pen Test Cost vs the Cost of NOT Pen Testing

Based on our company's experience over the past two decades, we can confirm that the cost of pen testing is always less than the cost of NOT doing pen testing. Let's try to elaborate on this.

See more
March 11, 2025

You’re a DORA Critical Third-Party Provider, Now What?

If you have already been designated as a CTPP or expect to be, here’s what you need to do/know as a critical third-party provider under DORA.

See more
Feb. 27, 2025

A CISO’s Guide to Purple Teaming

Our take on why a CISO might want to do Purple Teaming as one of their first actions on the job, and how Purple Teaming compares to Red Teaming.

See more