Home
Services
THEOS Defense
Advisory
Transformation
Detection and Response
THEOS Offense
Adversary Emulation
Ethical Hacking
Risk-based Vulnerability Management
Customers
Theos Labs
Career
Get in Touch
Home
Services
THEOS Defense
Advisory
Transformation
Detection and Response
THEOS Offense
Adversary Emulation
Ethical Hacking
Risk-based Vulnerability Management
Customers
Theos Labs
Career
Get in Touch
THEOS Labs
Our digital security playground for research, case studies and publications
All
Articles
Case Studies
Uncategorized
Closer Look at Android Root Detection Bypass Techniques: Using Emulator and Frida
May 31, 2023 | Ina Ngsuy
Read more
Red Team Operations: Introduction to Open-Source Intelligence
May 30, 2023 | Ina Ngsuy
Read more
Cybersecurity Roadmaps: Tailored to Your Organization
May 19, 2023 | Ina Ngsuy
Read more
Red Team Operations: Shortcut File as Initial Access Payload
Apr 12, 2023 | Ina Ngsuy
Read more
Cross-Site Request Forgery
Mar 31, 2023 | Ina Ngsuy
Read more
Deep Dive Guide to Broken Access Control
Mar 30, 2023 | Ina Ngsuy
Read more
IoT Security
Mar 24, 2023 | Ina Ngsuy
Read more
Cyber Threats to Watch Out for in 2023
Mar 22, 2023 | Ina Ngsuy
Read more
Adapting to the Threat Landscape in Southeast Asia
Mar 21, 2023 | Ina Ngsuy
#Cyber Threats, cybersecurity, MDR, Southeast Asia
Read more
Cybersecurity for SMBs: Protecting Your Business Online
Mar 9, 2023 | Ina Ngsuy
#Advisory, cybersecurity, Managed Detection & Response, Vulnerability Management
Read more
Pen Testing vs. Red Teaming
Mar 6, 2023 | Ina Ngsuy
Read more
Penetration Testing
Mar 2, 2023 | Ina Ngsuy
Read more
Maturity Assessment
Mar 1, 2023 | Ina Ngsuy
#Ethical Hacking, Maturity Assessment, Vulnerability Management
Read more
Implementing CASB
Feb 28, 2023 | Ina Ngsuy
#CASB, cybersecurity
Read more
Purple Teaming: Enhancing Cybersecurity Posture through Collaborative Testing
Feb 20, 2023 | Theos
#Adversary Emulation, Ethical Hacking, Managed Detection & Response, Offense
Read more
Penetration Testing vs Red Teaming
Feb 15, 2022 | Theos
#Offense
Read more
Penetration Testing Methodology
Feb 15, 2022 | Theos
#Offense
Read more
What is CSPM?
Feb 15, 2022 | Theos
#Defense
Read more
What is CASB?
Feb 15, 2022 | Theos
#Defense
Read more
Delivering an end-to-end Vulnerability Management programme to reduce attack surface
Jan 9, 2022 | Theos
#Vulnerability Management
Read more
Delivering GRC Consulting Services for a global crypto market leader
Dec 23, 2021 | Theos
#Advisory
Read more
Adversary Emulation for a technology business in Asia
Oct 21, 2021 | Theos
#Adversary Emulation
Read more
Adversary Emulation with APT Scenario for one of the largest insurances in Asia
Sep 3, 2021 | Theos
#Adversary Emulation
Read more
Protecting 8000+ endpoints for one of the largest insurances in Asia
Jul 15, 2021 | Theos
#Managed Detection & Response
Read more
Delivering VAPT programme for one of the largest stock exchanges in SEA
May 5, 2021 | Theos
#Ethical Hacking
Read more
Theos is at Rootcon! Tune in to hear our CEO Alex Hudelot share how company culture can drive Security outcomes!
Mar 11, 2021 | Theos
Read more
Top 10 Enterprise Security Award
Feb 22, 2021 | Theos
Read more
Adversary Emulation for a Global NGO, supporting their mission to help Children
Jan 19, 2021 | Theos
#Adversary Emulation
Read more
Protecting a hospital from operational disruption
Nov 26, 2020 | Theos
#Managed Detection & Response
Read more
Private Equity Acquisition leads to a Security Transformation Programme
Aug 21, 2020 | Theos
#Transformation
Read more
Assessing the effectiveness of a Cyber Programme in the F&B sector
Apr 15, 2020 | Theos
#Advisory
Read more
Protecting 250+ applications for one of the largest insurance company in APAC
Feb 15, 2020 | Theos
#Ethical Hacking
Read more