Our presentation for #CRESTCon will look into the resource development tactic within the MITRE ATT&CK framework, reflecting on observed trends in threat actor behaviours and toolkits as part of attacks. Craig Martin and Nicholas Thanos will showcase how resources are developed to enhance attack efficacy, focusing on AI-enhanced phishing campaigns, exploiting initial access, and utilising customised toolkits, including RaaS tools. As part of this #CCAU24 presentation, Nick and Craig will reference examples observed during incidents they have responded to across the previous 12 months, offer practical strategies for enhancing defensive measures, and provide actionable takeaways for SMEs and large enterprises to improve their security posture. Find out more: https://lnkd.in/dpqgifX
Triskele Labs
Computer and Network Security
South Melbourne, Victoria 6,454 followers
When Experience Matters
About us
Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve multiple point security solutions to protect your IT infrastructure against the global threat landscape. We are continually improving to deliver whatever it takes through a customer focused partnership where honesty, integrity and passion drive everything we do. We believe in delivering robust outcomes and solutions that defend, protect and manage your networks and systems to significantly mitigate your risks.
- Website
-
http://triskelelabs.com
External link for Triskele Labs
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- South Melbourne, Victoria
- Type
- Privately Held
- Founded
- 2014
- Specialties
- PCI Compliance, Governance, Regulations and Compliancy, Penetration Testing, Security Compliance Training, Code Review, Developer Training, Security Architecture, Security Operations Centre, Social Engineering, Cyber Awareness and Training, Cloud Security Reviews and assessments, Simulated Phishing, Risk Management Assessments, Vulnerability Assessments, Compliance and Assurance, Asset Recovery, Incidence response, Internal Threat Assessments, Data Recovery, Cyber Strategy and Planning, Incident Response Plans, 24x7x365 Security Operations Monitoring, Third Party Risk Assessments, Internal and external network testing, Pen Testing, and Managed Services
Locations
-
Primary
60 Albert Rd
South Melbourne, Victoria 3205, AU
Employees at Triskele Labs
Updates
-
Quick update from our People & Culture team and Simon French, our Talent Lead! We are looking for: ⤵ Team: Commercial ▶ Sales Support (Melbourne): https://lnkd.in/g3usJxnA ▶ Sales Development Representative (Melbourne): https://lnkd.in/giNcmfm8 ▶ Senior Business Development Manager (Melbourne): https://lnkd.in/gqqH8-Dy ▶ Senior Business Development Manager (Sydney): https://lnkd.in/gTPHukeR ▶ Pre-Sales Solutions Consultant (Melbourne): https://lnkd.in/gdsXXHHH Team: Defensive ▶ Security Reporting Analyst (Melbourne): https://lnkd.in/gfVZEPwn Team: Offensive ▶ Security Managing Consultant (Melbourne): https://lnkd.in/g2cQvG53 Team: DFIR ▶ Digital Forensics Analyst (Sydney or Perth): https://lnkd.in/guRKTnVM Reach out to have a chat: 📲 0411 488 212 📧 [email protected]
-
The 61% rise in extortion attacks indicates a sharp escalation in the frequency and severity of cyber incidents in Australia. Orange Cyberdefense report highlights that healthcare, finance, and critical infrastructure are among the most targeted, reflecting attackers’ focus on high-value targets. Attackers are employing increasingly sophisticated tactics, such as double extortion methods, where data is both encrypted and threatened to be publicly released. Find out more 🎧 ▶ YouTube: https://lnkd.in/g38TCnqR ▶ Spotify: https://lnkd.in/gVNvqPaS
-
IBM's 2024 Cost of a Data Breach report reveals that the average cost of a data breach in Australia has reached a record high. Similarly, Rubrik's research highlights that data breaches were 50% more common in Australia than the global average in 2023, indicating a growing threat landscape: Find out more 🎧 ▶ YouTube: https://lnkd.in/g38TCnqR ▶ Spotify: https://lnkd.in/gVNvqPaS
-
Australian businesses with an annual turnover of more than AU$ 3 million will be required to disclose ransomware payments within a short period after making the transaction. Some thoughts are whether this will mean greater visibility and will it incentivise organisations to work on their cyber security. Brad M. and Richard Grainger shared their views in the latest episode of TL Blue: Find out more 🎧 ▶ YouTube: https://lnkd.in/g38TCnqR ▶ Spotify: https://lnkd.in/gVNvqPaS
-
Triskele Labs reposted this
Exciting times as Triskele Labs are looking for our first ever Sales Director. Reporting to the CCO, this role is pivotal in shaping our sales future as we continue to build our presence in Australia and Internationally.
-
We are looking for more superstars to join our teams across Advisory, DFIR, Offensive, Commercial and Service Delivery. For a confidential discussion please reach out to Simon French directly: 📩 [email protected] ⤵️ ➡️ Associate Advisory Consultant (Technical GRC): https://lnkd.in/gfhaaXTS ➡️ Digital Forensics Analyst: https://lnkd.in/guRKTnVM ➡️ Offensive Security Managing Consultant: https://lnkd.in/g2cQvG53 ➡️ Senior Business Development Manager - Sydney: https://lnkd.in/gTPHukeR ➡️ Senior Business Development Manager - Melbourne: https://lnkd.in/gqqH8-Dy ➡️ Project Coordinator - Cybersecurity: https://lnkd.in/eavEU3DQ ❗All available roles: https://lnkd.in/gSGjAqGF
-
This quick 19-minute episode recorded by Nick Morgan and Richard Grainger features answers to some of the questions the team received about CrowdStrike Falcon Agent and the outage it caused; ▶ Why do we have auto-updates turned on? ▶ What about the timing of the update? ▶ Non-cyber incident categorisation of this event. 🎧 YouTube: https://lnkd.in/gErTZYac 🎧 Spotify: https://lnkd.in/gthBgKiH
-
We are updating our blog for the #crowdstrike issue. In the meantime, it is important to note that if devices are not blue screening by this point, then they have definitely received the reversion of the content update from CS and will be stable. No action is needed.
-
We are aware of the global Crowdstrike issue. Our technical team have vetted and confirmed the workaround which can be found at the link below.
Crowdstrike Falcon Agent causing Blue Screen of Death (BSOD) Errors
triskelelabs.com