Reinforce resilience. Realize opportunities. Disrupt your disruptors.
Insights
Warlock Ransomware Warpath
Precision Blitzkrieg Warlock ransomware (aka Storm 2603, Warlock Dark Army, GOLD SALEM, FIN11, TA505, Dungeon Spider, UNC902) emerged in the wild March 2025 and has since published dozens of victims, ramping up quickly and successfully in the world of ransomware…
Is Automated Pen Testing for Me?
Leading a global penetration testing practice several years ago I found that most organizations that planned their needs last minute were meeting compliance that they didn’t know was needed or required with a partner, with a few clients who cared…
Model Context Protocol (MCP) – Transformative AI Tech with Risk
Model Context Protocol (MCP) is transformative for artificial intelligence (AI), standardizing and creating context for a Large Language Model (LLM) to interact with external tools and data (e.g. Application Programming Interface (API), database, and files). Think of MCPs like containers…
executive Buy-In Post Breach Webinar
We host webinars every two months. Contact us for a link to our former webinar content.Featured

Vishing
-Crowdstrike 2025 Global Threat Report
Remediation - 4D5A Security's own Ken Dunham coined the phrase "Vishing" after witnessing a Romanian actor using a significant amount of VoIP technology as part of TTPs in attacks, years ago. Now it's raging! Tired of getting these calls, reach out and we'll help you harden against attack!

USA Under Attack
-ThreatDown Malwarebytes 2025 State of Malware
Remediation - Criminals are following the money, so the USA is under attack, with a surge against manufacturing in particular in 2024. We live and breath ransomware and can help you harden against attack before it strikes, by maturing your cyber hygiene, stopping top vectors of attack, and ensuring the attacks that are at your door are stopped dead in their tracks.

Can you Recover?
-PaloAlto Unit42 Global Incident Response Report 2025
Remediation - Demonstrate that you can recover from loss of data or encrypted simulations, before ransomware strikes. Don't just hope your cloud provider can take care of business. Take note that ransomware tries to delete your backups! Are they immutable? Let us help you design and test to demonstrate you're ready!
Trending

External Exposure
-Dragos 8th Annual Year in Review OT/ICS CyberSecurity Report 2025
Remediation - Manage and prioritize your vulnerabilities differently based upon your attack surface and risk. External facing assets, and what you have on those assets, need to be managed differently. This is a strategic choice that must make its way into operations and tactical operations on a daily basis.

RDP Woes
-ThreatDown Malwarebytes 2025 State of Malware
Remediation - RDP is the most common form of initial access performed in 2024, easily hardened against attack. We can help you remove low hanging fruit along with other initial vectors of attack and attack surfaces that actors seek to exploit to gain a foothold into your network.

Identity Access Management - The Weak Link
-PaloAlto Unit42 Global Incident Response Report 2025
Remediation - Ensure your IAM stack is hardened against attack. You'll need expert counsel and threat driven experts to ensure you get it right! IAM is complicated with lots of places to go wrong in hybrid infrastructure with legacy, cloud, mobile, integrated API/SaaS and more.
