HD Moore Joins Research-Driven Consulting Firm

  /     /     /  
Publicated : 22/11/2024   Category : security


HD Moore Joins Research-Driven Consulting Firm


Metasploit creator joins Atredis Partners.



Metasploit creator and famed security researcher HD Moore has joined Atredis Partners, a firm that performs penetration tests and research for its clients.
Word of Moores new position came today via an Atredis Partners tweet: Were excited to announce @
hdmoore
 has joined Atredis as our VP, Research and Development. Were taking over the world, one shell at a time.
Moore has kept a relatively low profile in the past year since he
left his post as chief research officer at Rapid7
, where he had been since 2009. In an interview with Dark Reading today, Moore said in the past year he continued his work on the Metasploit Framework, the open source pen-testing platform, and conducted penetration-testing engagements and assisted startups.
Atredis Partners - which was co-founded by three veteran security researchers formerly from Accuvants Applied Research Team, Nathan Keltner, Shawn Moyer, and Josh Thomas - conducts penetration testing for its security assessment practice, security assessment for its embedded (think IoT, mobile, and industrial products) practice, and offers risk and advisory services.
Moore says Atredis gets really interesting gigs, including security assessments of medical devices, drones, and even spacecraft products. In a lot of cases, we are brought in when no tools exist yet, and so we generally then write our own tools to assess and pen-test the products in question, Moore says.
Its clients include OEMs and resellers of a product that want to ensure the security of it, he says. Atredis then works directly with the manufacturer to remedy any security issues, for instance.
In addition to his new post at Atredis, Moore will continue his work on Metasploit as well as helping startups get off the ground.
According to
Atredis website
, the firms penetration testing team takes a targeted, client-centric testing approach that starts with an attacker profile, industry-centric threats, and risk tolerance. We use real attack scenarios and advanced vulnerability research techniques, identifying known attack classes while also finding new zero-day vulnerabilities unique to your environment. Finally, we collaborate with you to develop a realistic mitigation strategy, aligned with your specific requirements.
Related Content:
10 Newsmakers Who Shaped Security In the Past Decade
Cardiac Implant Flaw Patched, But Holes Remain
Ex-US National Security Official Clarke: Regulation Key To Protecting ICS/SCADA From Cyberattacks
 

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
HD Moore Joins Research-Driven Consulting Firm