Security Assessments


We design products, packaging and user experiences with a unique research-based process i call Informed Creativity. Our work has been recognised with multiple international awards and widely covered in the press.

What we do


We work for the most innovative and best-loved companies in the technology world.

Simulated Attack – Red Teaming

Red teaming is an exercise that simulates a threat actor actively maneuvering against an organization. It aims to test your people, processes, and technologies of your organization. It also provides…


Web Application Penetration Testing

Web Application Penetration Testing is a specific type of penetration testing that focuses on identifying web-related vulnerabilities and assess their impact on the business. Web Application…


Mobile Application Penetration Testing

Mobile Application Penetration Testing is specialized in assessing vulnerabilities in mobile apps environment, particularly on iOS and Android applications. The testing also assesses the backend API…


Infrastructure Penetration Testing

Infrastructure Penetration Testing assesses the security controls of the network and system infrastructure. Different from application penetration testing, Infrastructure Penetration Testing usually…


Phishing Simulations Assessment

Phishing Assessment uses deceptive emails, websites and other forms of cyberattacks to illegally gather personal information of its victims. Phishing Assessment applies phishing to gauge your staff…


Vulnerability Assessment

Vulnerability Assessment is a process to identify known vulnerabilities and insecure configurations amongst systems. This process serves as a health check of the internal systems and networks and…