KoreLogic’s cover photo
KoreLogic

KoreLogic

Computer and Network Security

Annapolis, MD 316 followers

About us

In 2004, we founded KoreLogic to build an IT security company that was respected for the quality of its work and the caliber of our staff. We have stayed true to that. We are grateful to our customers for trusting us to deliver critically important services to them. Over their careers, KoreLogic staff have served over forty Fortune 500 clients and hundreds of commercial, nonprofit and government clients. We use our offensive testing experience to assess risk, to design and build solutions that help our clients defend their critical assets. We have won multi-year, multi-million security research projects from DARPA. At DEF CON, we organize the annual Crack Me IF You Can password cracking contest. We have presented at the DEF CON, Black Hat, ShmooCon, Techno-Security, OWASP, and DerbyCon Conferences. The KoreLogic Team actively pursues the identification of vulnerabilities. Our Vulnerability Disclosure Program was created to responsibly distribute vulnerability information to the public in a controlled manner and follow common industry practices associated with disclosing newly identified vulnerabilities, which are not protected by KoreLogic client confidentiality/non-disclosure agreements. The advisories can be seen here: https://korelogic.com/advisories.html KoreLogic Security publishes several open-source projects, available at https://git.korelogic.com/ or our github page, https://github.com/KoreLogicSecurity We are ISO 27001:2022 certified.

Website
https://korelogic.com/
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Annapolis, MD
Type
Privately Held
Founded
2004
Specialties
Information Security, Penetration and Application Testing, Applied R & D, Secure Rapid Application Development, Mobile Device Testing, Malware Analysis, Training, Exploit Development, Password Recovery, Windows Domain Password Audits, and Reverse Engineering

Locations

  • Primary

    116 Defense Highway, Suite 300A

    Annapolis, MD 21401, US

    Get directions

Employees at KoreLogic

Updates

  • We released five advisories for Xorux XorMon Original and Xorux XorMon Next Generation (NG): Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information: https://lnkd.in/eEQBmTTq Xorux XorMon-NG Web Application Privilege Escalation to Administrator: https://lnkd.in/eyFhm-iq Xorux XorMon Original LPAR2RRD Read Only User Denial of Service: https://lnkd.in/eQPdYtsd Xorux XorMon Original LPAR2RRD Read Only User Log Download Exposing Sensitive Information: https://lnkd.in/eEm29MsZ Xorux XorMon Original LPAR2RRD File Upload Directory Traversal: https://lnkd.in/evTSX4C3

  • KoreLogic reposted this

    View organization page for CREST

    28,073 followers

    Welcoming new Members to our cyber community! 🙌 Being a CREST Member is more than a badge of honour. It is about joining a network of forward-thinking professionals across the globe who are shaping a safer digital future together. Please join us in welcoming our newest Members: ➡️ Ampcus Cyber ➡️ Anchoram ➡️ BSS ➡️ Borderless CS ➡️ Cloudtrace ➡️ Echo Pulse ➡️ EliteSec Information Security Consultants, Inc. ➡️ Fluid Attacks ➡️ Inspira Enterprise ➡️ Intigriti ➡️ KoreLogic ➡️ Laneden Ltd ➡️ Ssquad Global ➡️ TrustedSec ➡️ Zenzero Find out about becoming a CREST Member on our website: https://lnkd.in/eE2YQYSZ

  • KoreLogic recently attended the “𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲 𝗙𝗼𝗿𝘂𝗺 𝗠𝗮𝘀𝘁𝗲𝗿𝗰𝗹𝗮𝘀𝘀 𝗖𝗼𝗻𝗳𝗲𝗿𝗲𝗻𝗰𝗲 (April, 2025 – Washington, D.C.)” sponsored by our friends at the Cyber Security Docket. https://lnkd.in/eQCiYcc4 This conference focuses solely on the field of incident response (IR) and is geared specifically for legal professionals with incident response expertise. This conference is unusual in that the panelists are uniformly best in class and legal IR thought leaders. It benefits those of us in cyber by understanding how attorneys approach IR given their influence during a response. The following takeaways reflect the ideas shared by the panelists. Special thanks to Bruce Carton and John Reed Stark for their hospitality and putting on an amazing conference. Some key takeaways that caught our eye:  1. 𝗜𝗥 𝗥𝗼𝗹𝗲(𝘀) 𝗼𝗳 𝘁𝗵𝗲 𝗕𝗼𝗮𝗿𝗱: Their most critical role: ensure that incident root cause analysis is done and corrective action taken.  2. S𝗼𝗹𝗮𝗿𝗪𝗶𝗻𝗱𝘀 𝗖𝗜𝗦𝗢 𝗣𝗲𝗿𝘀𝗼𝗻𝗮𝗹 𝗖𝘆𝗯𝗲𝗿-𝗟𝗶𝗮𝗯𝗶𝗹𝗶𝘁𝘆: Periodically review public-facing security statements (e.g., trust center or security statement web pages) to ensure that they are not over-stating security posture or controls.  3. 𝗗𝗮𝘁𝗮 𝗣𝗿𝗼𝘁𝗲𝗰𝘁𝗶𝗼𝗻/𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲: Throughout a response, think “Is our response scope (still) correct? Are we still focused on the right things?”.  4. C𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗡𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗙𝗼𝗿𝗲𝗰𝗮𝘀𝘁: An additional number of, and increased activity by existing, APTs are being observed. Campaigns involving 0-days being used more freely and not being held in reserve. The “Hack Back” concept is resurfacing as a potential deterrent of cybercrime. Attacks on critical infrastructure attacks are moving from pre-positioning to operational disruptions. Triggers for nation-state actors include tariffs, Taiwan, geopolitical and regional tensions, etc. 𝗜𝗻𝘁𝗲𝗿𝗲𝘀𝘁𝗶𝗻𝗴 𝗥𝗲𝘀𝗼𝘂𝗿𝗰𝗲𝘀 𝗖𝗶𝘁𝗲𝗱:   • Data Minimization: A Crucial Pillar of Cyber Security: https://lnkd.in/em-XXPMU  • CISO Redefined: Navigating C-Suite Perceptions & Expectations: Download here: https://lnkd.in/gpfmzC2Y    • State by state breach notification law reference: https://lnkd.in/e_8xfkWc 

  • View organization page for KoreLogic

    316 followers

    KoreLogic is a CREST-accredited penetration testing vendor! We are proud to announce that KoreLogic has obtained Council of Registered Ethical Security Testers (CREST) Company accreditation! Obtaining this accreditation is a testament to our commitment to excellence in the penetration testing space. This certification not only demonstrates our expertise but also showcases our position as a trusted partner in the industry. What does this mean for our clients and potential clients? That KoreLogic has mature, documented processes, service methodologies, and security practices. Our application and supporting evidence were subjected to a detailed review and scrutiny. Much like with our ISO certification, there are periodic reassessments to ensure that we are continually improving and maintaining best practices.

Affiliated pages

Similar pages

Browse jobs