CybersecTools API access is now live!Learn More
Attack Research Logo

Attack Research

Boutique security firm specializing in penetration testing and consulting

Services
Vulnerability Management
Application Security
GRC
API

450+ Data Points Per Product and Company

Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.

Request Access

Attack Research Description

Attack Research (AR) is a boutique security firm based in Northern New Mexico that specializes in penetration testing and security consulting engagements. The company provides customized security solutions tailored to each client's unique business needs, utilizing a flat organizational structure that enables rapid deployment of resources and small teams for personalized service. The firm offers penetration testing and vulnerability assessments for both external services and internal networks, ranging from limited tests on single hardware components to full-scope APT simulations. Their application assessment services include source code review, automated and manual testing of user input, authentication, API endpoints, and denial-of-service attacks. Attack Research also provides incident response services, performing forensically sound engagements to determine breach circumstances and detect evidence of compromise. Additional services include custom training on topics such as exploitation of Windows and Unix systems, malware development, secure coding, and incident response. The company offers compliance and threat management support for standards including PCI and HIPAA, as well as security consulting and product design services. Attack Research serves specialized industries including avionics, SATCOM, automotive, military/government, gaming, SCADA/IoT, oil and gas, payment card industry, hedge funds, social media, entertainment, intelligence, state government, manufacturing, and medical sectors. The team has experience working with airlines, OEMs, Tier 1 suppliers, and government entities. Staff members hold security clearances and have expertise in reverse engineering, hardware attacks, and assessment of custom and proprietary technologies.