About us
SECFORCE is a cybersecurity consultancy, specialized in offensive security assessments offering both Consulting and Testing Assurance services.
SECFORCE is a cybersecurity consultancy, specialized in offensive security assessments offering both Consulting and Testing Assurance services.
The threats are real, constant and ever-changing. This is no time to compromise your security.
That is why some of the world’s leading organisations trust Secforce to test their systems, upgrade their security programmes and comply with their regulations.
We are a team of exceptional security consultants, with the knowledge and insight to identify vulnerabilities and help you secure your systems.
The key to an effective penetration test is not simply to identify weaknesses; it is critical to explore these weaknesses to understand the real threat risk for any organisation.
Learn moreThe real value of a Targeted Attack Simulation stems from its adoption of the ‘assume breach’ mindset. This makes it possible to assess the effectiveness of an organisation’s s…
Learn moreA holistic review of your testing programme aimed to understand its effectiveness and provide the advice and approach to maximise your results and enhance your security posture.
Learn moreAn end-to-end solution providing the necessary consulting capabilities, our proven track record of technical expertise and partnerships to cover all the DORA requirements.
Learn moreTake a look at how we managed to break through XSS filters using Markdown-nesting and user mentioning functionalities in Pega Platform
See moreMicrosoft Dynamics 365 Rich Text Editor XSS
See moreDiving into some common, but sometimes overlooked, AWS Cognito misconfigurations.
See moreWe’ve tested thousands of web applications over almost two decades… and we can confirm that a large percentage of web application exploitation vectors can only be discovered through penetration testing.
See moreWe don’t think the standard approach of modifying commercial C2s to evade detection will be sustainable for much longer. Artefacts of the original software will always create signatures, and as heuristics improve, those signatures will trigger detections. That's why we developed our own C2.
See moreThere are plenty of good tips on what to do to make a red team engagement a success. However, to ensure a successful red team engagement, you also need to know how to avoid common pitfalls.
See moreThank you!
Please try again later.