4
top cybersecurity certifications
+150
penetration testing projects
+20
years experience
Cybersecurity Excellence
Ethical Hacking involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit. It helps assess the effectiveness of existing security measures.
Having worked as a consultant and penetration tester for top tier banks, the European Central Bank, pharmaceutical and automotive companies across several regions and continents. We have a vast experience in all types of companies and projects.





.1
Penetration Testing
Involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit. It also helps to assess the effectiveness of existing security measures
.2
Vulnerability Assessment
Conducts a systematic review of hosts, servers, networks and applications to identify, classify and validate vulnerabilities that can affect the security of the company
.3
Smart Contracts & Web3 Security
New technologies such as blockchain, involve many risks. We assess the infrastructure, smart contracts audits and blockchain deployment for Web3 projects
.4
OT Cybersecurity Audit
OT (Operational Technology) is a paramount component in our industries. PLCs, Scada and IoT components are usually misconfigured and allow attackers to disrupt warehouse operations. We identify and help you to patch any vulnerability
.5
Secure Software Development
We also apply our security expertise to develop software with high standards of security: Mobile apps, blockchain development, payment gateways, etc
.6
Cybersecurity Consultancy
With a vast experience advising top banks, mobile video games, social network apps among others, we can also give guidance to your startup to minimize risks and become more resilient
.7
Phishing Simulations
Using same techniques as hackers do, with custom domains and tailor made emails, we lure your employees to click in a legit looking email that could compromise your organization. Extra guarantee: We do not charge anything if the emails did not get to your inboxes
.8
Active Directory Compromise
We check your Domain Controllers resilience against common attacks such as password spraying and lateral movement due to misconfigurations
.9
Mobile Apps Security Testing
With advanced reverse engineering techniques, we assess the security of your mobile apps and also propose hardening to block hackers to intercept your data or enhance your security
Our Team
Extensive experience tailored for your needs

Jacobo Avariento
Security Lead
Jacobo is a Certified Ethical Hacker, smart contracts auditor and lead security engineer with over 20 years of experience in cybersecurity, particularly within the banking and finance industries
Client Testimonials

United
We have been impressed with this persistence in finding bugs, his ability to explain his findings and Mr. Avariento is welcome and respected contributor to our Bounty program and we look forward to any additional submissions he provides

Airbus
Mr. Avariento was entrusted with the Technical Management of the Security Testing project team at the European Central Bank. He always fulfilled his tasks to our absolute satisfaction. He was extremely skilled employee and always served our customers very courteously and professionally

HP Enterprise
Hewlett Packard Enterprise would like to thank Jacobo Avariento working with Defensahacker for reporting CVE-2017-12544
TRY OUR ON-CHAIN SMART CONTRACT SCANNER
SUPPORTS ETHEREUM, ARBITRUM, BSC, AVALANCHE, POLYGON, BASE, GNOSIS
Latest news

Most critical GPO misconfigurations in Active Directory
Group Policy Objects (GPOs) are a double-edged sword in Active Directory. They’re designed to enforce[…]

Offensive Security in Active Directory: Top 5 Risks and Pentesting Tools
Active Directory (AD) is the heart of identity and access management in most enterprise Windows[…]

How to root Android 12 (Google Pixel 3a)
Let’s see how to root an Android phone with a rooted Android from the official[…]

What is Penetration Testing?
A penetration test, colloquially known as a pentest or as ethical hacking, is an authorized simulated attack performed to[…]
Contact Info
Let’s Chat
Get in touch with us to discuss your needs.