Singleton Security

— full range of CyberSec services

Is your data secure?
Locate potential data breach points.
Order vulnerability assessment now
Is your data secure?
Locate potential data breach points.
Order vulnerability assessment now
Singleton security team progress in 12 months
150+ vulnerability assessments
Found 1100+ vulnerabilities, 20% of which are critical
Trained over 850 devs in CyberSec practices
Competencies
Continuous monitoring
Pentesting
Security assessment services
Computer forensics
CyberSec consulting & compliance
Building and maintaining secure development processes
Stress testing services
Competencies
Continuous monitoring
Pentesting
Security assessment services
Computer forensics
CyberSec consulting & compliance
Building and maintaining secure development processes
Stress testing services
Why do companies trust Singleton Security?
Years of expertise
Singleton Security offers the best solutions thanks to in-depth understanding of the Russian information security market and practical expertise in cybersecurity across all major industries
Prompt response
Singleton Security has well-established project processes and task force teams for any type of task. Just one week from specs to project launch
Multitasking
Singleton Security can handle huge CyberSec problems due to the expertise of our team
Why do companies trust Singleton Security?
Industry certificates
Singleton Security holds a license from the Federal Service for Technical and Export Control of Russia (FSTEC) to carry out work on technical protection of confidential information. All team members have international certificates in the field of cyber security.
Industry certificates
Singleton Security holds a license from the Federal Service for Technical and Export Control of Russia (FSTEC) to carry out work on technical protection of confidential information. All team members have international certificates in the field of cyber security.
Going above and beyond
We solve problems, not work for a paycheck. Our team solves the maximum number of problems possible, not the required bare minimum
Customer-driven approach
Singleton Security's range of services satisfies a wide spectrum of CyberSec demands. We offer unconventional approaches to solving any non-trivial, complex, or localized task.
Consultation support
We provide comprehensive service support before a project, during the project and after it is accomplished. We also train our customers in different CyberSec aspects
Work according to international standards
We base our work on the best practices and WASC, NIST, OWASP regulations to guarantee compliance to the cutting-edge industry standards in our work
Singleton Security – a team of leading CyberSec expert practitioners
250+ penetration tests in three years
  • Egor
    Bogomolov
    Founder and CEO


    More
  • Pavel
    Sorokin
    Сhief Technical Officer


    More
  • Petr
    Pokamestov
    Project manager


    More
  • Maksim
    Bragin
    Chief application security analysis team specialist

    More
  • Artyom
    Komarskii
    Senior IT infrastructure security analysis team specialist
    More
  • Dmitry
    Molokovich
    Junior application security analysis team specialist

    More
  • Matvey
    Serdyukov
    Application security analysis team specialist

    More
  • Georgiy
    Kryuchkov
    Software developement team lead

    More
  • Yaroslav
    Makarov
    Application security analysis team specialist

    More
  • Naira
    Nurova
    Analyst in the audit department of information security
    More
Egor Bogomolov
Founder and CEO
Pavel Sorokin
Сhief Technical Officer
Petr Pokamestov
Project manager
Maksim Bragin
Chief application security analysis team specialist
Artyom Komarskii
Senior IT infrastructure security assesment team specialist
Dmitry Molokovich
Junior application security assesment specialist
Matvey Serdyukov
Application security analysis team specialist
Georgiy Kryuchkov
Software development team lead
Aleksandr Paltsev
Senior application security assesment specialist
Yaroslav Makarov
Application security analysis team specialist
Naira Nurova
Analyst in the audit department of information security
Industry events & contests
The Standoff 2023 (second place)  part of the True0xA3 team, November 2023
The Standoff 2023 (second place)  part of the True0xA3 team, May 2023
The Standoff Taks, Moscow 2023  “Yandex Bug Bounty experience”
The Standoff 2022 (second place)  part of the True0xA3 team, May 2022
Volga CTF 2022, September 2022  “Real-world vulnerability detection in image parsers”.
The Standoff 2021 (second place)  part of the True0xA3 team, November 2021
OFFZONE Moscow 2022, August 2022; "Specifics of security assessments of modern web apps"
The Standoff 2021 (first place)  part of the True0xA3 team, May 2021
BI.ZONE Bug Bounty Meetup, July 2022;  "BugBounty no-code automation in five minutes"
IDS Bypass (Third place), May 2019
The Standoff Moscow 2021, November 2021  "Evolution of EDR and antivirus bypass means"  winner of the popular vote
Wallarm & Qiwi HackQuest winner, June 2018
PHDays 2021, Маy 2021 “A Journey to Internaland or a Nightmare for a network administrator with Active Directory”
Competitive Intelligence (third place)
OWASP Moscow Meetup #9, "Security testing of GraphQL", December 2019.
June 2018 — DelfHack winner, May 2018
OFFZONE Moscow 2019, June 2019   "Attacks on Android Activity & Intents"
Participation in  BugBounty platforms: Yandex Hall of Fame, HackerOne, BugCrowd, Google VRP, Intigrity, Immunefi.
PHDays 2019, "Underappreciated vulnerabilities of modern Android apps", May 2019.
Singleton Security: CyberSec threat assesment & consulting services
Order service
Order service
Order service
Order service
Web app security
assesment
Order service
Mobile app security assesment
Red Teaming
Local network penetration testing
Social engineering
Secure developement
Order service
Order service
Order service
Order service
Order service
Order service
Outer network perimeter penetration testing
Web app source code assesment
Evaluation of employees' CyberSec awareness
Express security assesment of any information systems for vulnerabilities
CyberSec training
Incident investigation
Load testing
Red Teaming
Social engineering
Secure development
Benefits of information system audit
Organize effective protection of the inner and outer perimeters
Audit will allow you to analyze how and with what type of attacks a violator can penetrate the system. As a result, you will be able to protect yourself from possible threats
Optimize security expenses
Compiling a ranked list of potential security threats to the company will allow you to focus efforts primarily on eliminating critical threats and prevent financial losses
Improve your reputation
Conduct regular audits of your security systems and minimize the risks of new threats. By establishing an effective defense system, you will be able to keep confidential data of the company, clients, and partners safe
Data theft and compromise
Harvesting personal data for unauthorized use
Data leaks
Uncontrollable data leaks beyond Company perimeter
Attacks on Web apps
to gain users' confidential data
Cyber Espionage
Gaining unauthorized, often illegal access to sensitive data for various purposes
Malware
Software that disrupts normal operation of computers and apps
Phishing
Internet Fraud to gain users’ confidential data
What threats do companies face?