Some companies see cybersecurity as a cost center. We see things a little different. LEARN MORE >
Our seasoned Chief Information Security Officers bring strategic guidance to your leadership team, helping you right-size your cybersecurity operations.
A full suite of manage solutions from our US-based Security Operations Center (SOC)—staffed 24x7x365 by a full team of experienced analysts.
You can count on our IR team to contain the damage from a cyberattack, investigate the origins of the breach and build better protections for the future.
With an abundance of solutions and providers, the task of choosing the right option is critical and can sometimes be overwhelming.
Contact UsBlog
In this cautionary and insightful story from Inversion6’s Director of Incident Response, Tyler Hudak, a simple honeypot exercise takes an unexpected turn when a crucial forensic triage file mysteriously vanishes. What follows is a forensic deep dive revealing that an attacker—masquerading as “System32”—may have accessed and deleted the file before system isolation occurred.
Blog
In this installment of Honeypot Tales, our Director of Incident Response, Tyler Hudak, walks through a real-world encounter with an attacker determined to shut down SentinelOne on a compromised honeypot. From uninstall attempts and third-party tools to PowerShell commands and service control tricks, the attacker tried four different methods—yet all failed thanks to approval-based protections.
Blog
In today’s hyper-connected business world, third-party vendors are both essential and risky. In this post, Inversion6’s CISO, Damir Brescic, explains why Third-Party Risk Management (TPRM) is critical for strong cybersecurity.
Blog
Inversion6’s Director of Incident Response, Tyler Hudak, breaks down a growing cybersecurity threat: Bring Your Own Vulnerable Driver (BYOVD) attacks. By exploiting trusted but outdated or flawed Windows drivers, attackers can disable endpoint protections like Microsoft Defender, SentinelOne, and CrowdStrike—leaving organizations blind to intrusions.
Blog
Ransomware is no longer just a technology challenge—it’s a human one. In this post, Inversion6’s CISO, Damir Brescic, examines how groups like Scattered Spider are bypassing traditional defenses with social engineering, phishing, and identity attacks.
Blog
Fresh insights from Black Hat 2025—insider threats, AI risks, SOC modernization, and vendor trends shaping the future of cybersecurity.