BY CYBOLT

Threat intelligence and incident response

We protect your company’s infrastructure and digital assets by effectively detecting, resolving, and mitigating cybersecurity incidents. An Incident Response Team dedicated to monitoring the digital world to protect your company. Driven by scientific methology, deep expertise, and strong commitment. 

What is a CSIRT?

We protect your company against cyber threats

At the core of our approach is our CSIRT, a specialized team dedicated to the investigation, detection, analysis, mitigation, and response to cybersecurity incidents. We work tirelessly to protect organizations from cyber threats and support their recovery post-incident.

At BeaconLab, we are committed to delivering support, collaboration, and guidance throughout security incidents and providing recommendations to prevent future occurrences. We utilize cutting-edge investigative processes and the latest technologies to safeguard your digital assets.

If you have any questions or need cybersecurity assistance, please don’t hesitate to reach out to our team.

Our cyber incident approach

Our cyber incident approach

At BeaconLab, we follow the NIST incident response framework, which consists of four key phases. In the foundation phase, response plans are developed, a dedicated team is assigned, and security measures are implemented. During the detection and analysis phase, systems and networks are monitored, and the nature and scope of the incident are thoroughly investigated. The containment, eradication, and recovery phase focuses on taking decisive steps to contain and eliminate the incident, as well as restore normal operations. Finally, in the post-incident phase, the incident is reviewed, actions taken are documented, and improvements are implemented to prevent future incidents.

In addition to following this industry-standard framework, BeaconLab is an active member of FIRST, adhering to its regulations and actively collaborating with the global CSIRT community.

Latest alerts

Affected product(s): Description A high-severity vulnerability affecting Palo Alto’s PAN-OS software has been disclosed that could cause a denial of service (DoS) condition on affected devices. The flaw was identified

Affected product(s): CVE-2023-34990: CVE-2024-48782: CVE-2024-48889: Description Several vulnerabilities have been published for Fortinet products that can combine and become critical. Both vulnerabilities affect Fortinet’s Wireless LAN Manager (FortiWLM) software, the

Affected product(s): Additionally, users must make the following configuration changes depending on the version of Java they are running: Description A critical vulnerability has been disclosed in its Tomcat server

Affected product(s): Description A high-severity vulnerability affecting Palo Alto’s PAN-OS software has been disclosed that could cause a denial of service (DoS) condition on affected devices. The flaw was identified

Affected product(s): CVE-2023-34990: CVE-2024-48782: CVE-2024-48889: Description Several vulnerabilities have been published for Fortinet products that can combine and become critical. Both vulnerabilities affect Fortinet’s Wireless LAN Manager (FortiWLM) software, the

Affected product(s): Additionally, users must make the following configuration changes depending on the version of Java they are running: Description A critical vulnerability has been disclosed in its Tomcat server

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.