We are a Cyber Security Group

About us

The Unk9vvN research team operates under Oxin Imen Nikrad and provides expert technical services in the field of cybersecurity. This is not only our work, but our passion for almost ten years, we have already been trusted by many customers, including government companies and organizations.

Our Birthday

Our research team was established at the beginning of 2014 by an experienced IT security expert. As a result, this team has a management core that consists of technical people in the field of cybersecurity, the quality of services provided by us comes from a long-term presence in the cybersecurity industry, setting up this team for us is not just to establish a business, but passion. We also spend our free time on it. We participate in projects or supervise them so that the quality is at its highest level.

Our basic principle is to be honest with the client, so we only focus on providing services in which we have a lot of experience and are confident that the final work delivered to the client will meet his needs. For this reason, the existence of this company has been trusted by many well-known companies and organizations, such as international financial institutions, information technology, e-commerce, important infrastructures and government institutions, even for a short period of time.

Review of the scientific scope

One year after the beginning of the research work, the core of the team became its focus to investigate the scope of cyber science in different fields, from this it became a work to the extent of collecting nearly ten thousand research references, which finally strengthened the research work of the team.

Team Building

Since the discussion of team building in Iran is a very difficult thing from a cultural point of view, in this case, with many challenges and multiple selections, the core of the team is finally made up of talented and unknown young people who have many suitable factors to become a level researcher. And was formed.

Designing and implementing the roadmap

In the next step, the research team began to design professional roadmaps based on global standards, and after compiling very complete scientific roadmaps, in the next step, they began to implement the items mentioned in the roadmap. At the same time, he spent a lot of time on staffing and assimilating the research team, and finally the team has reached the first level of evolution in two penetration test cases and the red team.

In the field of cyber science, there are many cyber services that the hosts of internet businesses depend on, in addition, the cyber space is always growing and deepening its interactions, so it is necessary to carry out research activities on a continuous basis. to bring the highest level of security along with aggressive field research.

Three years later

In the field of cyber science, there are many cyber services that the hosts of internet businesses depend on, in addition, the cyberspace is always growing and deepening its interactions, so it is necessary to carry out research activities on a continuous basis. To bring the highest level of security along with aggressive field research.

Our expertise has been developed to help CSIRT teams (Computer Security Incident Response Team) and our consultants are certified by IT security certifications, we can perform more realistic attack simulations as well as their detection, because we are trained in the methods and tools used by real attackers.

Licenses Obtained