New Platform Release: Warrior’s Code

Today's release started out with just a handful of new features planned, but as usual, the team just couldn't help themselves from going all in. Perhaps it was the release name that inspired them to challenge themselves; if so we will need to add more battle oriented release names to our road-map because the end result is incredible! Critical Path Security is very proud to announce the latest release of Léargas, Warrior's Code! Cloud Based Hosts - Our clients can now include their hosted Windows and Linux servers into the Léargas monitoring sphere, increasing visibility and confidence in their cloud based ecosystem's security configurations! SIP Traffic - Voice over IP isn't anything new, but many network monitoring platforms lack even basic visibility into this vast data-set. Léargas lifts the curtain on SIP Traffic giving our customers the ability to view, aggregate, monitor and alert on detailed call information. Finally a…

0 Comments

Critical Path Security expands managed services to include, “Executive Cyber Protection”!

In today’s society, personal safety, security, and privacy are legitimate concerns. As a solution to the growing problem, Critical Path Security established an Executive Cyber Protection Program for offering executive cyber protection and security to select clients, including High Net Worth Individuals (HNWI) and Ultra High Net Worth Individuals (UHNWI). Our custom designed services are strategically developed, planned and implemented by a blend of cyber security experts to provide peace of mind to our clientele. Critical Path Security specializes in offering discrete executive cyber protection and security services while protecting our client’s anonymity. Our Cyber Security Professionals are experts in planning, threat assessments, threat monitoring, crisis management, and providing emergency incident response. We understand that Executive Cyber Protection requires much more than surrounding a client with well-trained Cyber Security Professionals; our team rely on perpetual monitoring and threat assessments that identify potential risks in order to prevent an incident before it occurs.…

0 Comments

Léargas Managed SOC Appliance

Critical Path Security is pleased to announce that we have started shipping our enterprise grade Léargas Managed SOC appliances! The hardware has been designed to stand up to the rigor and demand of large scale networks with the base appliance capable of ingesting and processing 10 gbps throughput!  We are also pleased to announce the release of Léargas RTL! This release comes hot on the coattails of Road Apples and extends many of it features including; Extensive upgrades to our TOR ingest for continuous dark web monitoring and advanced breach notifications. Natural Language Processing has been added to our Twitter ingest providing sentiment analysis that is used to identify comments from potential threat actors. Even more enrichment, correlating all dns flows & predict queries to highlight requests to potential malware sites. Eight new alerts have been added to our library keep our analysts abreast of important situations as they unfold.  Six new…

0 Comments

Detecting Cyber Attacks on ICS Networks

Critical Path Security is proud to announce that it has extended the Léargas passive security platform’s capabilities to include monitoring for ICS networks!    This release includes signatures and detections for both Modbus and DNP3 protocols, which are commonly used to manage power plants, oil pipelines, water treatment facilities and manufacturing plants where a single errant function call can ripple through vital systems causing failures and creating potentially dangerous situations. Our new signatures and detections enable Léargas to highlight potentially dangerous communications and identify malformed packets without the need to install an agent on a single endpoint, in real time! These signatures and detections are mapped to the 7 Stages of the Lockheed Martin Cyber Kill Chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives. Unlike the common CVSS scoring system, this rating structure provides insight to an attack as it progresses through an environment and…

0 Comments
Close Menu