THEOS OFFENSE takes a hacker perspective to pinpoint current gaps in your defenses, so you can fix them before the bad guys exploit them.


We help organisations to uncover the hackers that are hiding in their business environment that could potentially disrupt your
operations. Our services within Theos Offense strive to help people and organisations to identify vulnerabilities or weaknesses
within your defense strategy, so that your most critical assets such as your brand and reputation can be protected.

Intelligence-led red team exercise

Red Teaming is a scenario-based exercise during which ethical hackers leverage similar tools, tactics and procedures as real adversaries to put an organization defenses to the test. The exercise is designed around an agreed objective – data theft, operational disruption, ransom – and executed according to a predefined scenario. The outcome is a reality check on the strength of your current defenses and demonstrable ways your organization could be compromised.

This service is particularly effective at assessing real-life security maturity, testing MSSP capabilities and justifying security budget requests.

Main Red Teaming scenarios:
  • Advanced Persistent Threat: end-to-end black box scenario where Red Team Operators have no initial knowledge or access to the organization. The exercise starts with a reconnaissance phase followed by attempts to gain an initial foothold via several attack vectors.
  • Assume Breach: scenario geared towards detection and response capabilities where Red Team Operators have an initial access to a compromise asset and attempt to escalate into a broader objective.
  • Third Party Compromise: determine what would happen if one of your major supplier was compromised. How far would an attacker go?
  • USB Drop-in / Mail-in: this specific technique remains widely used in Asia. We leverage custom-made USB devices to determine the likelihood that such an attack would be successful
Identify flaws in your applications, infrastructure and clouds, and effectively reduce your attack surface.

What is a better way to test the security of your critical assets than letting a few (ethical) hackers in and seeing what they can do? We apply rigorous methodologies, creative techniques and quality-oriented processes to deliver high-end penetration testing services to some of the most sensitive businesses in Asia.

Our CREST Accredited Penetration Testing Services enable you to meet regulatory requirements, and provide assurance that you are partnering with a team applying the highest standards in the security industry in Asia.

We (ethically) hack the following assets:
  • Business Applications & Infrastructure: Web Applications, API / Web Services and Mobile Applications are one of the prominent vector of data compromise. We deliver in excess of 250 tests per year on these technologies in Asia, the majority of which for financial services.
  • Active Directory: directory services usually hold the keys to your crown jewels. When did you last test the security of your AD? Preventing privilege escalations through Active Directory compromise might be the difference between a single user being compromised and your entire intellectual property ending up on the dark web.
  • Cloud Services: with so many assets now residing in the cloud it has become a no-brainer to test these environments, whether IaaS, PaaS or Saas, for exposed services, misconfigurations and user permissions.
  • Blockchain and Crypto Project: blockchain is in our DNA. We test patforms holding billions in crypto assets and some trading upwards of $500M daily in fiat and stablecoins. We admire and embrace the technology and we know all too well that a single flaw can put a crypto business to its knees. When investing massively in the latest NFT project, you want a partner who understands and values why this is unique.

Identify, prioritise and remediate vulnerabilities across your digital footprint.

Managing vulnerabilities is a foundation of any security programme. Scanning, prioritising and reporting is the bare minimum one should perform on a regular basis.

We take this further. First, identifying vulnerabilities should be continuous so you don’t wait for the next scan to know that you are exposed. Second, prioritising should be a factor of risk, not just CVSS scoring. Third, vulnerability management is as good as the resulting remediation.

We partner with Qualys – a leader in the vulnerability management space – to provide vulnerability management as a service in Asia.

RBVM Service:
  • Continuous Vulnerability Identification: our solution continuously crawls through data extracted from in-scope assets to identify vulnerabilities as they are known without waiting for the next round of scheduled scan
  • Risk-Based Prioritisation: our prioritization process accounts for the criticality of assets, the relative exposure of the vulnerability to different internal and external threat actors as well as threat intelligence feeds enriching data with knowledge of known exploits and active campaigns.
  • Remediation: while remediation will always sits with the asset owner, we spend quality time with your teams to best address the most pressing issues identified.

Powered by:


We would love to hear from you