1:"$Sreact.fragment" 2:I[69035,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],"Separator"] 23:I[22016,["/_next/static/chunks/dcc0aaa9e51b99ba.js","/_next/static/chunks/cc25d45eddca1107.js","/_next/static/chunks/7876da7140eec274.js"],""] 24:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"OutletBoundary"] 25:"$Sreact.suspense" 0:{"buildId":"SnQbk_Hk3Neu5-OQJ-O5Z","rsc":["$","$1","c",{"children":[["$","div",null,{"children":[["$","section",null,{"className":"px-6 py-24 md:py-32","children":["$","div",null,{"className":"mx-auto max-w-4xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight md:text-5xl","children":"Security Services"}],["$","p",null,{"className":"mx-auto max-w-2xl text-lg text-muted-foreground","children":"End-to-end offensive and defensive security services delivered by experienced researchers and engineers with a track record of discovering critical vulnerabilities."}]]}]}],["$","$L2",null,{}],["$","section",null,{"className":"px-6 py-24","children":["$","div",null,{"className":"mx-auto max-w-7xl space-y-8","children":[["$","div","Penetration Testing",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Penetration Testing"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"We simulate real-world attacks against your applications, networks, and infrastructure to identify exploitable vulnerabilities before malicious actors do."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Web application testing (OWASP Top 10)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Web application testing (OWASP Top 10)"}]]}],["$","li","Network & infrastructure assessments",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Network & infrastructure assessments"}]]}],["$","li","API security testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],"$L3"]}],"$L4","$L5","$L6"]}]}]]}]}],"$L7","$L8","$L9","$La","$Lb"]}]}],"$Lc","$Ld"]}],null,"$Le"]}],"loading":null,"isPartial":false} 3:["$","span",null,{"className":"text-sm text-muted-foreground","children":"API security testing"}] 4:["$","li","Cloud configuration review (AWS, GCP, Azure)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Cloud configuration review (AWS, GCP, Azure)"}]]}] 5:["$","li","Wireless network testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Wireless network testing"}]]}] 6:["$","li","Detailed remediation guidance",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Detailed remediation guidance"}]]}] 7:["$","div","Red Team Operations",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-crosshair h-6 w-6 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","line","l9bcsi",{"x1":"22","x2":"18","y1":"12","y2":"12"}],["$","line","13hhkx",{"x1":"6","x2":"2","y1":"12","y2":"12"}],["$","line","10w3f3",{"x1":"12","x2":"12","y1":"6","y2":"2"}],["$","line","15g9kq",{"x1":"12","x2":"12","y1":"22","y2":"18"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Red Team Operations"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Full-scope adversary simulation that tests your entire security program — people, processes, and technology — using the same tactics real attackers employ."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Multi-phase attack campaigns",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Multi-phase attack campaigns"}]]}],["$","li","Social engineering & phishing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Social engineering & phishing"}]]}],["$","li","Physical security testing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Physical security testing"}]]}],["$","li","Command and control operations",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Command and control operations"}]]}],["$","li","Detection & response evaluation",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$Lf","$L10","$undefined"]}],"$L11"]}],"$L12"]}]}]]}]}] 8:["$","div","Code Review",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-code-xml h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","1inbqp",{"d":"m18 16 4-4-4-4"}],["$","path","15zrgr",{"d":"m6 8-4 4 4 4"}],["$","path","e7oirm",{"d":"m14.5 4-5 16"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Code Review"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Expert manual source code analysis combined with automated tooling to identify security vulnerabilities, logic flaws, and hardening opportunities in your codebase."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Manual source code analysis",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Manual source code analysis"}]]}],["$","li","Automated static analysis (SAST)",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Automated static analysis (SAST)"}]]}],["$","li","Dependency & supply chain auditing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Dependency & supply chain auditing"}]]}],["$","li","Authentication & authorization review",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Authentication & authorization review"}]]}],["$","li","Cryptographic implementation review",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L13","$L14","$undefined"]}],"$L15"]}],"$L16"]}]}]]}]}] 9:["$","div","Security Training",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-graduation-cap h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","j76jl0",{"d":"M21.42 10.922a1 1 0 0 0-.019-1.838L12.83 5.18a2 2 0 0 0-1.66 0L2.6 9.08a1 1 0 0 0 0 1.832l8.57 3.908a2 2 0 0 0 1.66 0z"}],["$","path","1lu8f3",{"d":"M22 10v6"}],["$","path","1r8lef",{"d":"M6 12.5V16a6 3 0 0 0 12 0v-3.5"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Security Training"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Hands-on workshops and training programs to level up your development and operations teams on secure coding, threat modeling, and incident response."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Secure coding workshops",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Secure coding workshops"}]]}],["$","li","Threat modeling sessions",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Threat modeling sessions"}]]}],["$","li","CTF-style training exercises",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"CTF-style training exercises"}]]}],["$","li","Incident response tabletops",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Incident response tabletops"}]]}],["$","li","Security awareness programs",{"className":"flex items-start gap-3","children":["$L17","$L18"]}],"$L19"]}]}]]}]}] a:["$","div","Real-time Monitoring",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-activity h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","169zse",{"d":"M22 12h-2.48a2 2 0 0 0-1.93 1.46l-2.35 8.36a.25.25 0 0 1-.48 0L9.24 2.18a.25.25 0 0 0-.48 0l-2.35 8.36A2 2 0 0 1 4.49 12H2"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Real-time Monitoring"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Continuous security monitoring and alerting for your infrastructure, providing early warning of threats and rapid incident response support."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","24/7 threat monitoring",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"24/7 threat monitoring"}]]}],["$","li","Intrusion detection & prevention",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Intrusion detection & prevention"}]]}],["$","li","Log analysis & correlation",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Log analysis & correlation"}]]}],["$","li","Anomaly detection",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Anomaly detection"}]]}],["$","li","Incident response support",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L1a","$L1b","$undefined"]}],"$L1c"]}],"$L1d"]}]}]]}]}] b:["$","div","Vulnerability Research",{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border py-6 shadow-sm border-border/50 bg-card","children":["$","div",null,{"className":"grid gap-6 p-6 md:grid-cols-2 md:p-8","children":[["$","div",null,{"children":[["$","div",null,{"className":"mb-4 flex h-12 w-12 items-center justify-center rounded-xl bg-primary/10","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-bug h-6 w-6 text-primary","aria-hidden":"true","children":[["$","path","1qisl0",{"d":"M12 20v-9"}],["$","path","uouzyp",{"d":"M14 7a4 4 0 0 1 4 4v3a6 6 0 0 1-12 0v-3a4 4 0 0 1 4-4z"}],["$","path","qol33r",{"d":"M14.12 3.88 16 2"}],["$","path","1b0z45",{"d":"M21 21a4 4 0 0 0-3.81-4"}],["$","path","5cxbf6",{"d":"M21 5a4 4 0 0 1-3.55 3.97"}],["$","path","1jl80f",{"d":"M22 13h-4"}],["$","path","1fjd4g",{"d":"M3 21a4 4 0 0 1 3.81-4"}],["$","path","1d7oge",{"d":"M3 5a4 4 0 0 0 3.55 3.97"}],["$","path","82j7cp",{"d":"M6 13H2"}],["$","path","fmnt4t",{"d":"m8 2 1.88 1.88"}],["$","path","1vgav8",{"d":"M9 7.13V6a3 3 0 1 1 6 0v1.13"}],"$undefined"]}]}],["$","div",null,{"data-slot":"card-header","className":"@container/card-header grid auto-rows-min grid-rows-[auto_auto] items-start gap-2 has-data-[slot=card-action]:grid-cols-[1fr_auto] [.border-b]:pb-6 p-0","children":["$","div",null,{"data-slot":"card-title","className":"font-semibold text-2xl","children":"Vulnerability Research"}]}],["$","div",null,{"data-slot":"card-content","className":"p-0 pt-4","children":["$","div",null,{"data-slot":"card-description","className":"text-base text-muted-foreground","children":"Original security research into widely-deployed software and hardware, with responsible disclosure and coordinated patching to protect the broader community."}]}]]}],["$","div",null,{"children":["$","ul",null,{"className":"space-y-3","children":[["$","li","Zero-day vulnerability discovery",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Zero-day vulnerability discovery"}]]}],["$","li","Responsible disclosure coordination",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Responsible disclosure coordination"}]]}],["$","li","CVE publication & advisory writing",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"CVE publication & advisory writing"}]]}],["$","li","Exploit development & proof-of-concept",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":["$L1e","$L1f","$undefined"]}],"$L20"]}],"$L21","$L22"]}]}]]}]}] c:["$","$L2",null,{}] d:["$","section",null,{"className":"px-6 py-24","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h2",null,{"className":"mb-4 text-3xl font-bold tracking-tight","children":"Need a Custom Engagement?"}],["$","p",null,{"className":"mb-8 text-muted-foreground","children":"Every organization is different. Let's discuss a tailored security assessment that fits your specific needs and threat model."}],["$","$L23",null,{"href":"/contact","children":["Get a Quote",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right h-4 w-4","aria-hidden":"true","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]],"data-slot":"button","data-variant":"default","data-size":"lg","className":"inline-flex items-center justify-center whitespace-nowrap text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive bg-primary text-primary-foreground hover:bg-primary/90 h-10 rounded-md px-6 has-[>svg]:px-4 gap-2","ref":null}]]}]}] e:["$","$L24",null,{"children":["$","$25",null,{"name":"Next.MetadataOutlet","children":"$@26"}]}] f:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 10:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 11:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Detection & response evaluation"}] 12:["$","li","Purple team debriefs",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Purple team debriefs"}]]}] 13:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 14:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 15:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Cryptographic implementation review"}] 16:["$","li","Secure development recommendations",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Secure development recommendations"}]]}] 17:["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}] 18:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Security awareness programs"}] 19:["$","li","Custom curriculum development",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Custom curriculum development"}]]}] 1a:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 1b:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 1c:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Incident response support"}] 1d:["$","li","Monthly security reporting",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Monthly security reporting"}]]}] 1e:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 1f:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 20:["$","span",null,{"className":"text-sm text-muted-foreground","children":"Exploit development & proof-of-concept"}] 21:["$","li","Vendor communication & coordination",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Vendor communication & coordination"}]]}] 22:["$","li","Public security advisories",{"className":"flex items-start gap-3","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check mt-0.5 h-4 w-4 shrink-0 text-primary","aria-hidden":"true","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-sm text-muted-foreground","children":"Public security advisories"}]]}] 26:null