Our IoT and Embedded Device Exploitation course at Black Hat USA has sold out! But don't fear - we run a version of this course at DEFCON Trainings and it still has space! Don't wait - register today! https://lnkd.in/ei_viXiq
Loudmouth Security
Computer and Network Security
Ottawa, Ontario 479 followers
Offensive. About security.
About us
Loudmouth Security was established in 2016 and has quickly become one of Ottawa’s elite cyber security consultancies. Operated by two Defcon Black Badge winners, Loudmouth performs offensive security assessments that demonstrate what a hacker could do to your organization. We bring awareness to the weaknesses and breakdowns in your cyber security defenses. Our team consists of Offensive Security Certified Professionals with a wealth of experience in penetration testing, vulnerability assessments, red teaming, social engineering, physical security and SCADA security. Our clients include Federal Government departments, Municipalities, Crown Corporations, and private corporations in various industries including health care, defense contracting, finance and manufacturing.
- Website
-
http://www.loudmouthsecurity.com
External link for Loudmouth Security
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Ottawa, Ontario
- Type
- Privately Held
- Founded
- 2016
- Specialties
- Cyber Security, Social Engineering, Physical Security, Red Teaming, Vulnerability Assessments, Penetration Testing, and Application Security
Locations
-
Primary
Albert St
Ottawa, Ontario, CA
Employees at Loudmouth Security
Updates
-
We believe in responsible disclosure, but when a vendor doesn't acknowledge or respond we feel it is important to notify the community. With that, check out our latest vulnerability disclosures: https://lnkd.in/eDzzPFYV https://lnkd.in/eE8KgQ7H
-
💥NEW OPPURTUNITY❗ We are looking for a Level 3 IT Security Vulnerability Analysis Specialist! Our client is looking for an experienced professional to join their team full time, on-site for an initial contract of 220 days. 💻 If you or someone you know has expertise in cloud security , vulnerability assessment tools (Rapid7, Burp Suite, NMAP, Qualys, etc), and information security incident handling, we encourage you to reach out. 💵 We offer competitive rates with a 10% markup for pass-through billing and a transparent billing process. The contract is one (1) year + three (3) option years for a total of 4 years. Must have or be eligible for a Canadian Security Clearance. ‼ Don't miss out on this opportunity to contribute to a leading organization's cybersecurity efforts! Reach out to learn more about the role. #ITSecurity #VulnerabilityAssessment #CloudSecurity #ContractPosition #Cybersecurity #JobOpportunity
-
Loudmouth Security believes in responsible disclosure, but sometimes vendors don't or won't acknowledge a reported finding. This was the case with Cypress Solutions, who did not acknowledge or respond to several attempts to contact them to report this vulnerability. We are releasing this disclosure report so that customers can be aware of this issue and take any necessary measures to protect their devices, including using strong passwords for authentication and preventing access to this device.
Just published my 2nd CVE: Cypress Solutions CTM-200 Root Command Injection (CVE-2023-47415) https://lnkd.in/gk-rxNXd
Loudmouth Security / vulnerability-disclosures / CVE-2023-47415 · GitLab
gitlab.com
-
🚀 Big News from Loudmouth Security! 🚀 We are excited to announce that our team has been selected to teach our Offensive IoT Exploitation course at the renowned Black Hat USA event this year. This marks a significant milestone for us and underscores our commitment to advancing cybersecurity in the rapidly evolving Internet of Things (IoT) landscape. Our course is meticulously tailored for cybersecurity professionals who possess a foundational understanding of penetration testing but may not have delved into the nuances of hardware analysis and IoT device exploitation. With the aid of a custom-built IoT device — designed to streamline the learning experience by eliminating common obstacles — and firmware reflective of real-world challenges, our participants will engage in a hands-on journey to master IoT security. Spanning two immersive days, attendees will tackle numerous in-depth hands-on labs, exploring critical topics such as IoT hardware debugging, memory extraction, firmware modification, leveraging common misconfigurations, exploiting vulnerabilities, device emulation, and navigating the complexities of Bluetooth Low Energy and Zigbee communications. This course cuts across several cybersecurity domains, including application security, operating systems, wireless signal analysis, and embedded hardware security. Our goal is to empower professionals to conduct thorough penetration tests on IoT devices, equipping them with the necessary skills to identify and exploit vulnerabilities effectively. Led by four seasoned penetration testers with extensive careers in IoT exploitation, and supported by 3 additional teaching assistants, this course promises an unparalleled level of 1 on 1 interaction with an instructor, and a learning experience aimed at enhancing the security posture of IoT devices across the board. https://lnkd.in/e-6fDctT #BlackHat #IoTSecurity #Cybersecurity #PenetrationTesting #HardwareHacking #IoTExploitation #SecureTheFuture #CyberReady #TechInnovation
Black Hat
blackhat.com
-
Loudmouth Security will be in Paris for DEFCON Training April 22nd-25th! Our Offensive IoT Exploitation course teaches security professionals and hackers how to identify and exploit security vulnerabilities in IoT devices. Participants will learn to interact with hardware debug capabilities, communicate with memory devices, and virtualize and analyze firmware. The course also covers various hardware attacks including glitching and side channel attacks, as well as diving into communications protocols, including Bluetooth, Zigbee, Thread and Matter. Use discount code "DCTPARIS2024" to get $250 off your order! https://lnkd.in/ekymfbGa #defcon #defcontraining #training #hacking #iotsecurity #iothacking #embeddedsystems
Offensive IoT Exploitation - EARLY €5,000 $5,500
training.defcon.org
-
🚀 We are looking for a Level 3 IT Security Engineer! Our client is looking for an experienced professional to join their team on an "as and when requested" basis. If you or someone you know has expertise in log ingestion, SIEM tools, and information security incident handling, we encourage you to reach out. We offer competitive rates with a 10% markup for pass-through billing and a transparent billing process. The contract is one (1) year + three (3) option years for a total of 4 years. Must have or be eligible for a Canadian Security Clearance. Don't miss out on this opportunity to contribute to a leading organization's cybersecurity efforts! Reach out to learn more about the role. #ITSecurityEngineer #ContractPosition #Cybersecurity #JobOpportunity
-
Had a great time teaching our course at DEF CON! Looking forward to the next one in Seattle!
Cybersecurity Investigator Focused on Complex Digital Investigations by Leveraging Digital Forensics and Big Data Analytics.
Ending #hackersummercamp with some new knowledge and skills related to IoT security thanks to the fine folks at Loudmouth Security. #offensivesecurity #iotsecurity #hacking #embeddedsystems #defcon #defcon31 #defcontraining
-