Think Evil

Be Good

It’s all a game of cat and mouse in the world of cybersecurity.

Who We Are

At Blackcat we believe the only way to sufficiently defend against cyber threat actors is to think like one. Our goal is to study the enemy so we can serve our customers with unique insights that you can’t get anywhere else.

Our operators are the best of the best hailing from FAANG and Fortune 500 companies. With a combined experience of 30+ years, we offer world class, bleeding-edge security services.

Red Team Engagements

Code Reviews

Penetration Tests

Customers Secured

Offensive Security

Here’s just a taste of what we can offer in terms of offensive security!

Adversary/Threat Emulation

Leverage real-world adversary tactics, techniques, and procedures, enhanced by both custom and open source cyber threat intelligence, to create a security test against your organization based on real world intrusion campaigns.

Phishing and Social Engineering

Launch a fully customized and tailored phishing campaign against your employees over a designated period of time to gain insight and visibility in your overall employee cybersecurity education and resiliency.

Vulnerability Assessment

A quick win for any leadership. Get a vulnerability assessment along with a quantitative and/or qualitative risk assessment. Ideal for organizations seeking compliance of any kind.

Defensive Security

Here’s just a taste of what we can offer in terms of defensive security!

Incident Response
A staff aug service giving you a full time dedicated resource to walk you through the appropriate steps in the event of a breach to help you recover swiftly, and restore business operations to full capacity. Ransomware. Data loss. Insider threat.
Digital Forensics
An expert resource to analyze your critical systems whether it’s post-breach, or an ongoing investigation.
Malware Analysis

Found a sample in you environment and not sure what it is? Send it to us and we’ll return you the IOCs and any necessary steps to take in response.

Incident Response
A staff aug service giving you a full time dedicated resource to walk you through the appropriate steps in the event of a breach to help you recover swiftly, and restore business operations to full capacity. Ransomware. Data loss. Insider threat.
Digital Forensics
An expert resource to analyze your critical systems whether it’s post-breach, or an ongoing investigation.
Malware Analysis

Found a sample in you environment and not sure what it is? Send it to us and we’ll return you the IOCs and any necessary steps to take in response.

Defensive Security

Here’s just a taste of what we can offer in terms of defensive security!

That’s Not All Though…

Cyber security is constantly evolving and so are we. View the full list of security services we provide and see the full extent of what we can provide for you!