Analysis of application architecture, vulnerability scanning, source code analysis (static analysis), fuzzing (dynamic analysis), recommendations for increasing level of software security at each stage of development.
Penetration testing (black and white box method), red team assessment, threat modelling, insider risks analysis, social engineering (phishing) of personnel, etc.
Load testing (DoS, DDoS), simulation of various load models, identifying bottlenecks in applications and infrastructure, availability monitoring, consolidated reports based on the results.
Complex audit of ICO projects, crypto exchanges and wallets with typical aspects of functioning and problems of the industry in mind.