Cybersecurity experts background

Cybersecurity experts

The digital universe is full of threats. As cybersecurity experts we are here to protect your company from all kinds of cyber attacks. We analyze vulnerable points and protect you against any current or future threats.

Contact us now

Cloud security audit

Protecting yourself from cyber criminal threats is a complex, full circle analysis. Vulnerability can be found around every corner.

Threat Hunting (MDR)

Every company should be ready to respond and prevent an attack with ransomware. Tarlogic knows how to respond to your needs.

Penetration testing services

Over 100 specialists work at Tarlogic to locate and cover your security weaknesses in your network.

Cybersecurity services

We audit your systems and protect them

The damage that cybercrime can do to your organization is devastating. Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Read more
Cybersecurity services
red team Cyber security

Red Team - Blue Team - Purple Team

Simulating attacks and responding to them

One attack and one defense team. We organize attacks on your company at random in order to test your defense’s response. We learn from the findings and optimize the system for any situation that may threaten your systems or data.

Read more

Cyber intelligence

Discovering threats while supporting your business

Tarlogic predicts threats that can affect your organization and provide you with high quality information to support your business strategy. We prevent attacks such as CEO fraud, ransomware and more.

Read more
Cyber intelligence
Cybersecurity Advisors

Cyber advice

A tailored solution for each company

Tarlogic understands your business. We advise your team’s management on creating solutions for their security based on your needs. We predict threats, define risks and neutralize them before they are an issue.

Read more
Our services

Cybersecurity company

Tarlogic offers you a 360° solution to protect your company from cyberattacks and improve your cyber resilience. We identify threats, deploy defenses and continuously monitor its effectiveness.

110

CYBERSECURITY PROFESSIONALS

140

CUSTOMERS PROTECTED

4.2K

FLAGS CAPTURED

575K

ASSETS AUDITED

8

INNOVATION PROJECTS

Adversary simulation banner

BlackArrow - Offensive security

Adversary Emulation

Continuously creating adversary emulations (phishing, smishing, etc..) to fine-tune your defenses and protect your business information.

Read more

Our Cybersecurity Blogs

Google messes up: Office 365 login portal is not from Microsoft

Cybersecurity blog

Google messes up: Office 365 login portal is not from Microsoft

«Office 365 login» With those words, many people start their workday to authenticate to Microsoft’s web tools, with which their companies are integrated. This Google search[...]

Read more
OWASP FSTM, stage 4: Extracting the filesystem

Cybersecurity blog

OWASP FSTM, stage 4: Extracting the filesystem

Many IoT devices run an embedded Linux operating system that can be found included in the firmware image, along with the corresponding file systems. This article discusses the iden[...]

Read more
AD CS: from ManageCA to RCE

BlackArrow blog

AD CS: from ManageCA to RCE

Introduction In our previous article, we covered an engagement where it was necessary to execute the ESC7 attack to escalate privileges by abusing the Active Directory Certificate [...]

Read more
AD CS: weaponizing the ESC7 attack

BlackArrow blog

AD CS: weaponizing the ESC7 attack

Introduction to AD CS ESC7 Last year, SpecterOps published an in-depth research about the security state in Active Directory Certificate Services (AD CS) that is still a common t[...]

Read more
Getting up before you fall: how to manage a cyber crisis

Cyber intelligence blog

Getting up before you fall: how to manage a cyber crisis

Cyber crisis management requires constant updating of knowledge due to the characteristics of the Internet[...]

Read more
The secretary who loved cyberintelligence

Cyber intelligence blog

The secretary who loved cyberintelligence

Anticipating to competitors, contain data leaks, prevent fraud. Cyberintelligence services applications will be crucial for businesses in digital age A seemingly minor variable. An[...]

Read more
NIS2: Strengthening the cybersecurity of the EU’s strategic sectors

Cyber for all Blog

NIS2: Strengthening the cybersecurity of the EU’s strategic sectors

The NIS2 directive aims to ensure the security of EU strategic sectors against cyber-attacks and to protect companies and citizens[...]

Read more
Cyber insurance: A complement to security audits

Cyber for all Blog

Cyber insurance: A complement to security audits

The digitalization of companies has had countless consequences. One of the most obvious is the fact that a large part of their critical assets is no longer physical, but digital. F[...]

Read more
partners background image

Our alliances

Our Partners / Technology manufacturers

checkmarx
kiuwan
tenable
sentinelone
burp suite
qualys
blueliv
cymulate
crowdstrike
cobaltstrike
paloalto cortex
maltego
mobile security banner

Recklessness often precedes calamity

Appian , 2nd century AD

Follow us on social media!

social media