Here at Borg Security we specialize in cracking the most complex Web2 on Web3 attack vectors. These attack vectors are more commonly know as "zeroday" exploits. Zerodays can be extremely devastating, they are unknown exploits that remain unknown until they are eventually exploited.
Borg Security started as a solution to secure Web3 infrastructure. Not all Dapps are fully decentralized and some are still vulnerable to Web2 attacks. Which is why we at Borg Security aim to be a bridge between Web2 and Web3 security.
Julian has a background in quantitative and mechanical trading, where he built high-performance tools in Python, Go, and Rust. He is OffSec certified and works with advanced exploitation techniques, in-depth reconnaissance, black-box testing, source code analysis, and comprehensive web application and infrastructure security assessments.
Theodor works at the intersection of technology and business to help Borg Security grow. He collaborates with technical teams to explain complex solutions in a way that’s clear and useful for clients and partners. Before joining Borg Security, he held roles in both technical work and partnerships, gaining experience with companies in the emerging tech space.
Per is a sales and marketing professional with a background in B2B sales and entrepreneurship. He founded an influencer marketing company with over 100 million views in its first year and has been recognised with honours for his service in the Norwegian Armed Forces. At Borg Security, he drives marketing and sales to fuel growth and strengthen the company's position in cybersecurity.
Recon is where we scope out and plan our attacks. Using internally developed tools we can pinpoint likely weaknesses quickly.
After the initial attacks, we perform a deep attack over components likely exploitable. Deep attacks are when we find new zeroday exploits.
Finally, we assist in mitigating the threats we discovered. In addition we do re-tests to ensure that the threat is eliminated.
We then perform a general attack aimed to identify weaknesses and protect against generic OWASP top 10 threats.
Thereafter we finalize everything into a detailed summary. Including each exploit discovered, suggestions and more.
We are here to help you secure your Web3 infrastructure. Contact us today to get started.