Our managed service provides continuous vulnerability scans on clients networks and applications. They are performed and monitored by our security experts who will propose a solution to your development team and validate after remediation.


Our application security experts help you to secure your development lifecycle: coaching, training of developers, automated code review with managed services from Checkmarx, ... All what is needed to produce secure code!


To secure websites and web applications in the cloud, we offer a SecurityasaService (SaaS) solution trough the use of Web Application Firewalls (WAF), a shield that detects and blocks attacks. It gives clients full visibility in the attacks against their web application.


Our penetration testing team is specialised in ethical hacking. They execute penetration tests on networks, infrastructures, WiFi, web and mobile applications, Internet of Things and industrial systems.


We offer companies a security advisor/consultant on demand to develop a strategy and a longterm approach to security within their organisation. Our experts have over a decade in experience aiding our clients in developing and guiding them towards the most optimal security strategy.


Our training center provides technical trainings about application security, hacking of websites,... At our office or onsite, we can teach you and your team the techniques commonly used to violate and exploit corporate networks, as well as the security techniques used to protect you against these attacks.

Training & Events

A standard reverse proxy such as ModSecurity depends on known patterns delivered by the community. The power of our WAF-solution is its self-learning nature and its scalability.

Erwin Geirnaert
Chief Hacking Officer

Not sure yet?

Get in touch with us or take our free trial.

Latest blogs

17 Oct '18 0 By egeirnaert

How a phisher tried to steal the credentials of our Chief Hacking Officer.... and failed!

02 Oct '17 0 By Laurens

Social engineering is social hacking -or a popular way of stealing information- manipulating the 'human being' as the weakest link. This typical social engineering attack, usually a phone scam, has been popular for years. The victims get tricked into believing their computers have been updated with security features while in reality their computer hasve been compromised. Many people fall for this type of scam resulting in time loss and all too often financial damage. We believe the main reason for this is because they target people who lack (deep) technical knowledge and interest of how their computer and the online world works.

27 Sep '17 0 By Laurens

Standard caching mechanisms such as varnish offer a great deal of performance. It has been built from the ground up to be a dedicated reverse proxy cache so it doesn't have legacy functionality and code, making it fast & highly responsive. While this is great for performance, this doesn't bring any extra added security. Since initial requests are still being server to the back-end this can cause for vulnerabilities to be more apparent and visible to a wider range of users because of the cache time.

23 May '17 0 By egeirnaert

The EternalBlue exploit is not to be underestimated because no user interaction is needed to compromise a system. Many malicious hackers will use this exploit to attack systems because it is so easy and successful.

When new malware spreads silently by just exploiting machines and then wait for further instructions, there will be a lot more infections then that we have seen in the last week. A new variant is already in the wild, UIWIX, waiting 24 hours to start malicious activity.