We Hack Differently.

From penetration testing to cloud security, we’ve got you covered.

Our Services

What We Do

Abricto Security is redefining penetration testing and the value it brings to our customers. With decades of experience, we’ve seen it all and developed our services to dynamically tailor-fit each of our clients. From custom security assessments to long-term service partnerships, digging deep to understand your organization’s specific challenges is what sets us apart. Our “you first” attitude impacts everything we do, which is why we approach each client with a unique set of solutions.

Our Services

Who We Are

Abricto Security is a team of security leaders, consultants, ethical hackers and cloud professionals working together to test and strengthen your company’s security posture. We bring together real-world expertise and a passion for all things security.

About Us

We Run On 100% "You First" Values

We know it takes open communication to derive mutual trust from your partner cyber security firm. That’s why we lead with a “you first” attitude that impacts everything we do. At the end of the day, it’s your business, your security and your peace of mind.

Contact Us

Our Services & Assessments

Abricto Security offers a wide array of specialized assessments to measure and quantify the effectiveness of your organization’s security controls. These are great snapshots of current security posture. Services are on-going partnerships designed to iteratively improve security controls and practices.

Our Services

LatestBlogs

Defining the Secure Software Development Lifecycle (SSDLC)

By Cornel du Preez | June 30, 2020 | Blog

Here at Abricto Security we believe that application penetration tests only reveal the tip of the iceberg. Specifically, if we conduct an...

Read More »

Our Response to COVID-19

By Cornel du Preez | April 13, 2020 | Blog

Abricto Security understands that all industries feel the impact of COVID-19 and we’re here to help. Our team is shifting our operating procedures...

Read More »

SQLmap Cheatsheet and Examples

By Cornel du Preez | April 02, 2020 | Blog

Target the http://target.server.com URL using the “-u” flag: sqlmap -u ‘http://target.server.com’ Specify POST requests by...

Read More »

Request a Consultation

Cybersecurity can be a complicated matter. We offer a consultation for those who’d like to learn more.

Send us a note