Cybersecurity experts background

Cybersecurity experts

The digital universe is full of threats. As cybersecurity experts we are here to protect your company from all kinds of cyber attacks. We analyze vulnerable points and protect you against any current or future threats.

Cybersecurity

Protecting yourself from cyber criminal threats is a complex, full circle analysis. Vulnerability can be found around every corner.

Ransomware

Every company should be ready to respond and prevent an attack with ransomware. Tarlogic knows how to respond to your needs.

Hardening

Over 100 specialists work at Tarlogic to locate and cover your security weaknesses in your network.

Cybersecurity

We audit your systems and protect them

The damage that cybercrime can do to your organization is devastating. Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Read more
Cybersecurity
red team Cyber security

Red Team - Blue Team - Purple Team

Simulating attacks and responding to them

One attack and one defense team. We organize attacks on your company at random in order to test your defense’s response. We learn from the findings and optimize the system for any situation that may threaten your systems or data.

Read more

Cyber intelligence

Discovering threats while supporting your business

Tarlogic predicts threats that can affect your organization and provide you with high quality information to support your business strategy. We prevent attacks such as CEO fraud, ransomware and more.

Read more
Cyber intelligence
Cybersecurity Advisors

Cyber advice

A tailored solution for each company

Tarlogic understands your business. We advise your team’s management on creating solutions for their security based on your needs. We predict threats, define risks and neutralize them before they are an issue.

Read more
Our services

Our Cybersecurity Services

Tarlogic offers you a 360° solution to protect your company from cyberattacks and improve your cyber resilience. We identify threats, deploy defenses and continuously monitor its effectiveness.

110

CYBERSECURITY PROFESSIONALS

140

CUSTOMERS PROTECTED

4.2K

FLAGS CAPTURED

575K

ASSETS AUDITED

8

INNOVATION PROJECTS

Adversary simulation banner

Cybersecurity

Adversary Emulation

Continuously creating adversary emulations (phishing, smishing, etc..) to fine-tune your defenses and protect your business information.

Read more

Our Cybersecurity Blogs

If you trade in the Ethereum blockchain, you will lose your money. Here is why

Cybersecurity blog

If you trade in the Ethereum blockchain, you will lose your money. Here is why

You think you have developed a sense of how to invest in the cryptocurrency market? Maybe you can look at a price graph, add a couple of indicators, and tell whether the price will[...]

Read more
Tracking Ethereum blockchain attackers: Measuring sandwich attacks

Cybersecurity blog

Tracking Ethereum blockchain attackers: Measuring sandwich attacks

There are malicious actors perpetrating attacks in the Ethereum blockchain. However, due to its open and public nature, it is possible to identify and track down some of those atta[...]

Read more
AD CS: from ManageCA to RCE

BlackArrow blog

AD CS: from ManageCA to RCE

Introduction In our previous article, we covered an engagement where it was necessary to execute the ESC7 attack to escalate privileges by abusing the Active Directory Certificate [...]

Read more
AD CS: weaponizing the ESC7 attack

BlackArrow blog

AD CS: weaponizing the ESC7 attack

Introduction to AD CS ESC7 Last year, SpecterOps published an in-depth research about the security state in Active Directory Certificate Services (AD CS) that is still a common t[...]

Read more
Getting up before you fall: how to manage a cyber crisis

Cyber intelligence blog

Getting up before you fall: how to manage a cyber crisis

Cyber crisis management requires constant updating of knowledge due to the characteristics of the Internet[...]

Read more
The secretary who loved cyberintelligence

Cyber intelligence blog

The secretary who loved cyberintelligence

Anticipating to competitors, contain data leaks, prevent fraud. Cyberintelligence services applications will be crucial for businesses in digital age A seemingly minor variable. An[...]

Read more
Google MASA: What are the security requirements for apps?

Cyber for all Blog

Google MASA: What are the security requirements for apps?

Since the dawn of civilization, human beings have wanted to standardize the great technological advances they have generated. The Roman Empire extended its way of building roads, b[...]

Read more
Google MASA: Assessing the security of apps available in the Play Store

Cyber for all Blog

Google MASA: Assessing the security of apps available in the Play Store

A song starts playing on the radio. You like it and think «who could it be from?» You open your phone and download an app to recognize it for you. Then you download another app t[...]

Read more
partners background image

Our alliances

Our Partners / Technology manufacturers

checkmarx
kiuwan
tenable
sentinelone
burp suite
qualys
blueliv
cymulate
crowdstrike
cobaltstrike
paloalto cortex
maltego
mobile security banner

Recklessness often precedes calamity

Appian , 2nd century AD

Follow us on social media!

social media