I am very excited to announce a new initiative powered by FRSecure that will be known as Project Hyphae.
We will be dedicating time and resources from our technical services team, Team Ambush, to identify risks or indicators of breaches within Hyphae member organizations’ environments that may be impactful—providing the information needed to remediate systems, prevent breaches, and potentially even eradicate attackers.
We will also research for leaked data, credentials, and other Indicators of Compromise (IoCs). If discovered, organizations will be notified, and we’ll provide some recommendations of what should be done next based on the findings.
This initiative is 100% free to all accepted members.
Why the Name Project Hyphae?
A hypha is the branching filamentous structure of a fungus.
Multiple hypha make up what is known as hyphae (pronounced “hai-fee,” originating from the Greek word for “web”), and this collection comprises what is known as the mycelial network.
A mycelial network is the primary mode of vegetative growth of the fungal organism (mushroom). This mycelial network develops symbiotic relationships with other living organisms—integrating with roots of plants and trees to develop a harmonious relationship. It takes away toxins and is able to identify illness or nutritional deficiencies. Once those deficiencies are identified, the network then delivers nutrients needed to improve the life of the living organism—healing illness, and improving its well-being through the symbiotic relationships throughout this network.
We will serve as the hyphae—working with project members to improve the health of their security program.
Why are we doing this, and what exactly are we doing?
Our mission at FRSecure is to fix the broken information security industry. We hate seeing attackers profit at the expense of good, hard-working people. Anything that we can do to prevent another breach, incident, or ransomware event is a step in the right direction.
We’ll be utilizing our own security experts to scour public data sources for critical vulnerabilities and indicators of compromise:
- Critical Vulnerability Check
- Insecure Port Exposure
- Leaked Credential Sets
- IoC Research
- Active Attack Analysis
- Recommendations
This information will be used to notify unsuspecting affected entities of their risks along with guidance on how to mitigate these risks.
We expect nothing in return. Execution of this mission is part of our duty as security experts.
How can I sign up for Project Hyphae?
We are beginning signups now for our pilot group.
The initial round will be limited to the first 100 participant organizations, but we plan to open up more spots as time allows.
If you aren’t lucky enough to get a seat in this pilot group, you can still sign up for our waiting list. We’ll notify you when we open up more seats.
What do YOU need to do?
Sign up! That’s it.
Once you sign up, we’ll send an email to you with a quick overview of the program as well as a few questions that are optional for you to answer. If you choose to provide us with further information, that will assist us in ensuring we have everything we need to properly analyze your environment.
We’re truly excited to be able to offer this initiative. The more we can remove barriers for organizations while continuing to help them improve how they protect information, the better.
If you’d like to sign up for the pilot round of Project Hyphae, would like to learn more, or have any questions, please visit projecthyphae.com.