NaradMuni NaradMuni Bot
Hello! I'm NaradMuni — CyRAC's AI security assistant. Ask me about CVEs, threat actors, security best practices, or how CyRAC can help your organisation.
CyRAC
🇮🇳 India's Cyber Research & Analysis Center

We think like your
 
so you don't have to.

Hands-on threat hunters, red teamers, and incident responders protecting organisations of all sizes — before, during, and after attacks. Research-first. Battle-tested.

Book free consult → Explore services
Aligned to
MITRE ATT&CK NIST CSF CIS Controls ISO 27001 OWASP
200+
Incidents handled
98%
Containment rate
12+
CVEs disclosed
24/7
IR coverage
[00] Why CyRAC
Research-first. Execution-focused.
We don't just run tools and produce reports. Every engagement is backed by original research, real adversary techniques, and engineers who've handled live breaches.

Research-driven approach

Our team actively discovers and discloses vulnerabilities. We bring original research into every engagement — not just commodity tooling. 12+ CVEs published and counting.

Rapid response, no handoffs

When you're under attack, you talk directly to the engineer handling your incident — not a ticketing system. 4-hour response SLA, 24/7, with zero bureaucracy.

Built for Indian organisations

Deep understanding of the Indian threat landscape, regulatory environment (CERT-In, SEBI, RBI), and the unique challenges faced by Indian enterprises and startups.

[01] Services
What we do
End-to-end cybersecurity across the full attack lifecycle — from finding weaknesses to containing breaches.
01 / VAPT

Vulnerability Assessment & Pen Test

We go beyond automated scanning — our engineers manually exploit what tools miss.

  • Web & API application testing
  • Mobile (Android & iOS) assessments
  • Network & infrastructure testing
  • Source code review
OWASP · PTES
02 / RED TEAM

Threat Simulation & Red Teaming

Full adversary emulation using real-world TTPs to stress-test people, process, and technology.

  • ATT&CK-mapped campaigns
  • BYOVD & LOLBin techniques
  • Phishing & social engineering
  • Physical security testing
MITRE ATT&CK
03 / CLOUD

Cloud Security & Posture

Secure your cloud from misconfiguration, privilege escalation, and data exposure risks.

  • AWS / Azure / GCP hardening
  • IAM & privilege analysis
  • CSPM & CIEM integration
  • Compliance mapping (SOC 2, ISO)
AWS · AZURE · GCP
04 / IR

Incident Response & Forensics

When you're under attack, we contain fast, investigate thoroughly, and help you recover cleanly.

  • 24/7 detection & containment
  • Digital forensics & root cause
  • Sigma rules & SIEM/SOAR playbooks
  • Post-incident hardening
NIST IR · CERT-In
[02] Engagement process
01

Free consult

We understand your environment and threat concerns — no sales pitch.

02

Scoping & proposal

Tailored scope, clear deliverables, and a fixed timeline agreed upfront.

03

Engagement

Hands-on work by senior engineers — you get live updates, not radio silence.

04

Reporting

Executive and technical reports with prioritised, actionable remediation steps.

05

Re-test & sign-off

Free re-test of critical findings. We don't close until you're actually safer.

[03] Intelligence
Trending threat insights
What our team is tracking right now — curated from active engagements and threat research.
AI-powered spear phishing is surging

LLM-generated, context-aware lures are bypassing traditional filters and security awareness training at scale. Attackers are personalising at costs near zero.

MFA bypass techniques are maturing

Push fatigue, SIM swapping, and CSRF-based bypass are making legacy MFA unreliable. Phishing-resistant FIDO2 keys are now the minimum bar for privileged access.

Zero Trust adoption is non-negotiable

Perimeter-based security models are failing against supply chain attacks. Identity-aware proxies and microsegmentation are the foundational shift organisations must make.

Cloud misconfigurations remain #1 breach cause

Overprivileged IAM roles, public S3 buckets, and exposed metadata endpoints account for the majority of cloud breaches we investigate. Posture management is critical.

Supply chain attacks via open-source packages

Typosquatting, dependency confusion, and malicious package updates are a growing vector. SBOMs and dependency pinning are now security requirements, not nice-to-haves.

Mobile threat surface is underestimated

Banking trojans, sideloaded APKs, and insecure deep-link handling are rampant in Indian apps. Mobile VAPT is still treated as optional by most organisations.

[04] Research & blog
Press & publications
Original research and practical guides from the CyRAC team. Real findings, real techniques.
Incident Response

Incident Response vs. Incident Handling — A Beginner's Survival Guide

The difference between IR and IH isn't just semantic — it determines whether your team survives a breach or drowns in it.

Authentication Security

2FA Bypass via CSRF Attack — Real-World Exploitation

A step-by-step breakdown of how a cross-site request forgery chain completely defeats two-factor authentication protections.

Threat Detection

From Ransom Notes to Sigma Rules — Ransomware Detection in Action

Building production-ready Sigma detections from real ransomware TTPs we observed during active incident response engagements.

Account Security

Account Takeover via Password Reset Poisoning

How attackers silently take over accounts by exploiting password reset flows — no brute force, no phishing, just a subtle HTTP header manipulation.

📬 Stay ahead of every threat

Join security professionals across India getting CyRAC's weekly intelligence briefing — actionable, concise, and free.

  • Weekly CVE digest with exploitability context
  • CISA KEV alerts the moment they drop
  • Threat actor TTPs from our active engagements
  • Exclusive research before public release

No spam. Unsubscribe any time. Trusted by 500+ security professionals.

[05] Live threat intel
🧠 NaradMuni AI-curated security updates 🛡️
Real-time CVE and known-exploited vulnerability data, curated by our AI assistant NaradMuni.
Loading threat feed…

Analyst picks this week

⚠️ Active exploitation
Windows CLFS Driver — Local Privilege Escalation

Actively exploited in ransomware campaigns. Patch Tuesday May 2025 fix available — apply immediately to all Windows Server endpoints.

🔴 Ransomware TTP
Scattered Spider using AI voice cloning for help desk social engineering

Threat actor group is calling IT help desks with cloned executive voices to reset MFA. Verify all reset requests via out-of-band callback to known numbers.

🟠 Supply chain
Malicious npm packages targeting Indian fintech developers

Packages mimicking popular Indian payment gateway SDKs are exfiltrating API keys. Audit your package.json dependencies immediately.

[06] About

About CyRAC

CyRAC — Cyber Research & Analysis Center — is a team of hands-on threat hunters, incident responders, red teamers, and security engineers dedicated to protecting organisations of all sizes.

We're not a traditional consulting firm. We combine original vulnerability research with battle-tested execution. Our engineers have handled active ransomware incidents, discovered and responsibly disclosed critical CVEs, and built detection engineering pipelines used in production SOCs.

We translate complex risk into clear, prioritised, actionable steps — and we stay until the job is actually done.

NIST CSF CIS Controls ISO 27001 MITRE ATT&CK SOC 2 CERT-In OWASP
Threat Hunting & IR
  • 24/7 investigation & containment
  • ATT&CK-mapped detections & runbooks
  • Digital forensics & root cause analysis
  • CERT-In compliant incident reporting
VAPT & Red Team
  • Web, API, mobile, and cloud assessments
  • Realistic adversary emulation (BYOVD, LOLBins)
  • Source code & architecture review
  • Social engineering & phishing simulations
Cloud & Detection Engineering
  • AWS/Azure/GCP hardening & posture monitoring
  • SIEM/SOAR integration & tuning
  • Sigma rule development & playbooks
  • Threat intelligence programme setup
[07] Contact
Work with us

Start with a free consult

Tell us about your environment, your concern, or an active incident. You'll speak directly to a senior engineer — not a salesperson. We respond within 4 hours, around the clock.

4hr response SLA
24/7 coverage
NDA on request

Your information is confidential. NDA available on request.