"Where Security Meets Serenity. With Klavan by our side, we've fortified not just our systems, but our peace of mind. It's not just about protection, it's about profound reassurance."

- Ethan S., Chief Operations Officer (COO)

When to Start SOC 2: Why Earlier is Always Better Than Later
Andrew Amaro Andrew Amaro

When to Start SOC 2: Why Earlier is Always Better Than Later

A practical guide for startups and growing companies navigating SOC 2 compliance timing

If you're running a growing tech company, you've probably heard whispers about SOC 2 in sales calls, investor meetings, or conversations with other founders. Maybe an enterprise prospect mentioned it in passing, or your head of sales asked when you'll have "that security report ready." If you're wondering whether your company is ready for SOC 2—or if you're still too small—this post is for you.

The short answer? You're probably ready to start sooner than you think.

Read More
Startup Security Alert: Protecting Your Business from the Top FBI-Reported Cyber Threats
SHELLHOUNDS SHELLHOUNDS

Startup Security Alert: Protecting Your Business from the Top FBI-Reported Cyber Threats

SHELLHOUNDS has analyzed the FBI Internet Crime Complaint Center's (IC3) 2024 Annual Report to provide our clients with actionable intelligence on the evolving cybersecurity landscape. The report reveals record-breaking financial losses of $16.6 billion, a 33% increase from 2023, with businesses and individuals submitting 859,532 complaints.

This analysis focuses on threats particularly relevant to businesses and organizations of all sizes, highlighting key trends, financial impacts, and recommended defensive measures.

Read More
Security Threat Intel Report - 2025-03-28
SHELLHOUNDS SHELLHOUNDS

Security Threat Intel Report - 2025-03-28

This enhanced analysis examines critical vulnerabilities and threat vectors affecting enterprise environments, with particular focus on VMware hypervisor exploits, ransomware developments, and supply chain attacks. The report highlights specific threat actor activities, including Lazarus Group and APT29 (Cozy Bear), and provides actionable intelligence with detection rules. Our assessment represents a comprehensive evaluation of current exploitation trends and effective defensive countermeasures.

Read More
Security Threat Intel Report - 2025-03-20
SHELLHOUNDS SHELLHOUNDS

Security Threat Intel Report - 2025-03-20

This analysis examines interconnected vulnerability chains affecting four major technology stacks: Fortinet security infrastructure, VMware virtualization environments, Microsoft Windows systems, and GitHub development pipelines. While these specific attack paths have not yet been observed in the wild, the individual components represent realistic exploitation scenarios aligned with current attacker methodologies. Our assessment provides a practical evaluation of potential exploitation and effective defensive countermeasures.

Brought to you by our very own - ShellHounds: Rapid Tactical Prototyping Lab | Klavan Security

A high-speed, black-box research lab for cyber & physical security R&D, focusing on offensive and defensive tech development, rapid prototyping, and real-world testing. Think DARPA meets underground skunkworks, with a mix of fun, cutting-edge, and deadly serious.

Read More
Good Will Hacking: The Good-Faith Security Researcher’s Dilemma in Canada and Beyond
Andrew Amaro Andrew Amaro

Good Will Hacking: The Good-Faith Security Researcher’s Dilemma in Canada and Beyond

Cybersecurity has never been more critical, with governments worldwide scrambling to protect sensitive infrastructure, safeguard privacy, and counter cyber threats. However, when it comes to good-faith security research—the practice of probing systems for vulnerabilities to improve security—the legal landscape is a mixed bag.

Here’s a deep dive into how Canada, the U.S., and Europe approach good-faith security research, through the lens of Bill C-26, Loi 25, and other global policies.

Read More
Bill C-26 Review
Andrew Amaro Andrew Amaro

Bill C-26 Review

Bill C-26 Review: Personal Privacy, Ethical Hacking and Law Enforcement.

Read More
BSides Ottawa 2024: Data Breaches and Dark Secrets: The Corporate Side
Andrew Amaro Andrew Amaro

BSides Ottawa 2024: Data Breaches and Dark Secrets: The Corporate Side

"Data Breaches and Dark Secrets," where I share my journey as a security researcher tracking cybercriminals and ransomware gangs. We'll discuss the challenges of helping organizations and victims, the need for accountability, and the aggressive tactics used to silence ethical hackers.

Read More