DeepEnd Research

deependresearch.org

DeepEnd REsearch, an independent information security research group that will focus on threat and intelligence analysis. Our emphasis will be on malware, exploit analysis, botnet tracking, the underground economy and overall cyberthreats. We will blog about various collection and analysis techniques, observations, and other areas of interest.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

SOFTWARE SECURITY

GUIDEPOST SOLUTIONS ACQUIRES SIGNIFICANT EQUITY INTEREST IN CYBERSECURITY SOLUTIONS FIRM TRUVANTIS, INC.

Guidepost Solutions LLC | March 29, 2022

news image

Guidepost Solutions LLC, a global leader in domestic and international investigations, compliance solutions, monitoring, and security and technology consulting, announced that it has acquired a significant equity stake in Truvantis, Inc., a cybersecurity company formed in 2010. Truvantis provides best-in-class cyber and privacy services to secure infrastructure, data, operations, and products. This strategic partnership allows both Guidepost and Truvantis to offer a wide-ranging suite of cyberse...

Read More

PLATFORM SECURITY,SOFTWARE SECURITY,WEB SECURITY TOOLS

SKYHIGH SECURITY ANNOUNCES ACHIEVING AMAZON WEB SERVICES SECURITY

Skyhigh Security | December 28, 2022

news image

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network...

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ABSOLUTE SOFTWARE ADDS TRELLIX ENDPOINT SECURITY TO APPLICATION RESILIENCE ECOSYSTEM

Absolute Software | September 20, 2022

news image

Absolute Software™ , the only provider of self-healing, intelligent security solutions, today announced a partnership with Trellix, enabling Absolute Resilience® customers to extend its patented Absolute Persistence® technology to Trellix Endpoint Security (ENS). With this latest addition to the company’s Application Resilience™ ecosystem, joint customers can leverage the power of Absolute’s firmware-embedded connection to ensure Trellix’s leading endpoint p...

Read More

THSUITE, POS SYSTEM IN CANNABIS INDUSTRY, LEAKS 85,000 FILES

Security Magazine | January 22, 2020

news image

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. The research team identified an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers. The leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,0...

Read More
news image

SOFTWARE SECURITY

GUIDEPOST SOLUTIONS ACQUIRES SIGNIFICANT EQUITY INTEREST IN CYBERSECURITY SOLUTIONS FIRM TRUVANTIS, INC.

Guidepost Solutions LLC | March 29, 2022

Guidepost Solutions LLC, a global leader in domestic and international investigations, compliance solutions, monitoring, and security and technology consulting, announced that it has acquired a significant equity stake in Truvantis, Inc., a cybersecurity company formed in 2010. Truvantis provides best-in-class cyber and privacy services to secure infrastructure, data, operations, and products. This strategic partnership allows both Guidepost and Truvantis to offer a wide-ranging suite of cyberse...

Read More
news image

PLATFORM SECURITY,SOFTWARE SECURITY,WEB SECURITY TOOLS

SKYHIGH SECURITY ANNOUNCES ACHIEVING AMAZON WEB SERVICES SECURITY

Skyhigh Security | December 28, 2022

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network...

Read More
news image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ABSOLUTE SOFTWARE ADDS TRELLIX ENDPOINT SECURITY TO APPLICATION RESILIENCE ECOSYSTEM

Absolute Software | September 20, 2022

Absolute Software™ , the only provider of self-healing, intelligent security solutions, today announced a partnership with Trellix, enabling Absolute Resilience® customers to extend its patented Absolute Persistence® technology to Trellix Endpoint Security (ENS). With this latest addition to the company’s Application Resilience™ ecosystem, joint customers can leverage the power of Absolute’s firmware-embedded connection to ensure Trellix’s leading endpoint p...

Read More
news image

THSUITE, POS SYSTEM IN CANNABIS INDUSTRY, LEAKS 85,000 FILES

Security Magazine | January 22, 2020

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. The research team identified an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers. The leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,0...

Read More

Resources

resource image

WEB SECURITY TOOLS

BSIMM Assessment for Datto RMM

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY, CERTIFICATIONS AND TRAINING

CISA Stakeholder-Specific Vulnerability Categorization Guide

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY

iOCO and WithSecure

Video

resource image

WEB SECURITY TOOLS

BSIMM Assessment for Datto RMM

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY, CERTIFICATIONS AND TRAINING

CISA Stakeholder-Specific Vulnerability Categorization Guide

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY

iOCO and WithSecure

Video

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us