FINANCIAL SERVICES · Tier-1 European bank · 2025

Identifying a pre-auth RCE in a deployed core-banking module before regulators did.

Continuous PTaaS engagement uncovered a serialization flaw in a vendor module integrated into the bank's payment-gateway perimeter. Verified exploitation produced unauthenticated remote code execution against an internet-exposed service. Disclosed to the vendor, patched within 11 days, and retested before any external party detected the issue.

11days
from disclosure to verified patch
HEALTHCARE · Multi-state US provider network · 2025

Reducing ransomware exposure across 240 facilities ahead of a known threat campaign.

Following sector intelligence on an active ransomware operator targeting healthcare, we ran a 6-week assumed-breach engagement across the provider's clinical and corporate networks. Identified seven distinct lateral-movement paths to clinical systems and built detection content for all of them. None were exercised by adversaries during the subsequent campaign window.

7paths
closed before campaign window
SAAS · Series-D B2B platform · 2024

Achieving SOC 2 Type II without slowing engineering velocity.

Client had a target audit window of 12 weeks and a 90-engineer org averaging 40 deploys per day. We embedded a small team to instrument continuous evidence collection in their existing CI/CD pipeline rather than impose a parallel control regime. Audit closed with zero exceptions; deploy frequency was unchanged at audit close.

0
audit exceptions
ENERGY · North American transmission operator · 2024

Detecting and removing an APT presence in an OT environment.

Client triggered our IR retainer after observing anomalous traffic between corporate and OT networks. Forensic analysis confirmed a six-month-old beacon implant on a historian server. Containment, eradication, and recovery completed in 9 business days with zero operational disruption. Threat-actor TTPs subsequently published with the client's sector ISAC.

9days
to full eradication
PUBLIC SECTOR · State agency · 2024

Modernizing penetration testing across 90 legacy applications.

A multi-year program migrating from annual point-in-time tests to a continuous program covering the agency's full application portfolio. First-year results: 318 verified findings (38 high or critical), all remediated within SLA. Cost-per-application dropped 42% versus the previous procurement model.

42%
lower cost per app
E-COMMERCE · Global marketplace · 2024

Stopping account-takeover fraud ahead of peak season.

Pre-peak red team focused on bot-driven credential stuffing and session-hijack abuse. We identified five previously-undetected fraud paths and built bot-management rules and detection content for each. ATO incidents during the subsequent peak period dropped 83% versus the prior year baseline.

83%
reduction in ATO incidents
// On confidentiality

We will never disclose a client without written permission.

If you'd like a verifiable reference for any engagement above — or one in your specific sub-sector — we can arrange a direct conversation under mutual NDA with a current customer.

// Become a case study

The next entry on this page could be yours.

Tell us what success would look like, and we'll work backwards from the outcome.

Start scoping