Threat Simulation
CortexTrace’s comprehensive suite of services delivers practical cyber security solutions for the digital challenges every organisation faces
CortexTrace’s comprehensive suite of services delivers practical cyber security solutions for the digital challenges every organisation faces
Our threat intelligence specialists help identify potential hostile actors, clarify their motives for targeted attacks, and outline the tactics, techniques, and procedures they may employ to breach your defences. Through an iterative process focused on critical assets and key personnel, Cortex Trace analyses and interprets the intelligence gathered. We then compile a customised threat report offering actionable insights to strengthen your organisation’s security posture.
There is a strong likelihood that a persistent, highly skilled attacker will ultimately breach your organisation’s initial defences, often through social engineering or by compromising edge devices and services. Unlike ethical security teams, these adversaries face no constraints on time, allowing them to methodically probe for weaknesses until they succeed. Recognising that a breach may eventually occur enables you to streamline the testing process—compared to a comprehensive Red Team engagement—while still achieving the majority of its protective benefits. At Cortex Trace, our Assumed Breach Simulation revolves around predetermined objectives, such as accessing restricted network segments, exfiltrating confidential data, or gaining administrative privileges. Our experts align the complexity of their attack methods with your organisation’s specific security maturity, ensuring realistic insights that drive meaningful improvements. Typically, the exercise begins from a compromised workstation in your environment or an unauthorised device on your network, mirroring genuine adversarial tactics.
Attackers frequently leverage password cracking to gain persistence or move laterally throughout your network.
Data from previous assessments reveals that, on average, 30% of user password hashes can be cracked in less than one hour using readily available tools, dictionaries, and low-cost hardware. Impersonating an employee’s digital identity often enables privilege escalation or access to critical data within the environment.
Our password analysis service provides insights into credential complexity, identifies password reuse, and calculates a risk score based on each account’s permissions and exposure.
Penetration testing is a valuable method for evaluating the security of your hosts and applications, yet it often remains constrained in scope.
It is not uncommon for IT teams to have an incomplete inventory of their internet-facing assets. Development environments, misconfigured devices, or test systems may be publicly accessible, providing adversaries with a straightforward path to breach your organisation’s external perimeter. Our perimeter assessment service identifies and maps all internet-exposed systems associated with your business, highlighting your potential attack surface. We then detail any easily exploitable vulnerabilities and present a comprehensive list of discovered assets, helping you gain a clear understanding of your current security posture
Social Engineering
When adversaries target your organisation, they do not solely concentrate on digital assets and infrastructure. Your workforce forms an essential component of the first line of defence.
Partnering with CortexTrace offers a realistic assessment of your employees’ security awareness and overall preparedness.
Commonly employed tactics include simulated phishing via email and SMS, phone-based social engineering, and physical intrusion techniques—such as tailgating or cloning access cards—to enter restricted areas of your organisation’s premises.