Canary Trap’s cover photo
Canary Trap

Canary Trap

Computer and Network Security

Mississauga, Ontario 1,606 followers

Catching Vulnerabilities and Trapping Exploits.

About us

Canary Trap is a leading North American cybersecurity firm specializing in comprehensive offensive security, security advisory, and assessment services. With a team of highly skilled and certified security professionals, we have a proven track record of assisting organizations of all shapes, sizes, and industry types across virtually all industry verticals in identifying security vulnerabilities effectively.  Our team of Subject Matter Experts (SMEs) come armed with the necessary certifications, experience and credentials that are necessary to conduct thorough and comprehensive assessments, ensuring comprehensive coverage and actionable insights.

Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Mississauga, Ontario
Type
Privately Held
Founded
2017
Specialties
Wireless Security Assessment, External Perimeter Penetration Testing, Internal Network Penetration Testing, Social Engineering Vulnerability Assessment , Web & Mobile Application Penetration Testing, Secure Code Review, Microsoft 365 Security Controls Review, Cloud Configuration Review, Cybersecurity Incident Management Planning, Physical Security Assessment, Red Team Exercise, Purple Team Exercise, API Penetration Testing, Tabletop Exercise, Social Engineering Vulnerability Assessment, and Physical Penetration Test

Locations

Employees at Canary Trap

Updates

  • The Medusa ransomware group is leveraging a malicious driver, dubbed ABYSSWORKER, in a "bring your own vulnerable driver" (BYOVD) attack to disable endpoint detection and response (EDR) systems. Delivered via a loader packed using the HeartCrypt packer-as-a-service, the driver—smuol.sys—mimics a legitimate CrowdStrike Falcon component and is signed with revoked or stolen certificates from Chinese vendors. Once installed, ABYSSWORKER can terminate processes, disable malware defenses, and remove security callbacks, giving attackers control over the system while evading detection. These tactics reflect a broader trend in ransomware operations toward using sophisticated, low-level tools to evade modern cybersecurity protections. Similar BYOVD strategies have also been seen exploiting outdated drivers like Check Point’s ZoneAlarm. Meanwhile, the RansomHub ransomware group has been linked to a custom backdoor called Betruger, which performs functions such as screenshotting, keylogging, and privilege escalation before launching ransomware attacks. These developments underscore a shift toward stealthy, persistent access methods designed to bypass traditional defenses and facilitate broader system compromise. Lakshmanan, Ravie. 2025. “Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates.” The Hacker News. Mar. 21. 𝗥𝗘𝗔𝗗: https://bit.ly/41Yc7Tg #CanaryTrap #RansomwareAlert #CyberThreats #BYOVD #EDRBreach

    • No alternative text description for this image
  • View organization page for Canary Trap

    1,606 followers

    🚀 𝐄𝐱𝐜𝐢𝐭𝐢𝐧𝐠 𝐍𝐞𝐰𝐬: 𝐖𝐞'𝐫𝐞 𝐍𝐨𝐰 𝐋𝐢𝐯𝐞 𝐨𝐧 𝐀𝐖𝐒 𝐌𝐚𝐫𝐤𝐞𝐭𝐩𝐥𝐚𝐜𝐞! 🚀 We're proud to announce that our service offerings are now available on AWS Marketplace! This milestone marks a significant chapter in our journey, opening the doors to new opportunities for both our company and our customers. Here's what this means for you, our valued customer base: • Seamless access to our services through the trusted AWS platform • Simplified procurement with streamlined processes • Greater flexibility, scalability, and value for our business needs We're committed to driving success and innovation together, and this new avenue enables us to serve you better than ever before. Thank you for your continued trust and support. This is only the beginning—let's reach new heights together! 🌐 #AWSMarketplace #Innovation #CustomerSuccess #Partnership #CanaryTrapxAWS

    • No alternative text description for this image
  • View organization page for Canary Trap

    1,606 followers

    When most people think of cybersecurity threats, they picture hackers outside the organization’s network, attempting to breach its defenses from afar. But the truth is, the most dangerous threats often come from within. Insider threats, ranging from malicious employees to careless contractors, have become one of the most significant challenges in the modern cybersecurity landscape. These threats are harder to spot and even harder to prevent, as they often originate from trusted individuals who already have access to sensitive data and systems. Whether it’s intellectual property theft, data breaches, or sabotage, the damage caused by insider threats can be devastating—not just financially but also reputationally. In this blog, we’ll dive deep into the world of insider threats and their growing impact on cybersecurity. We’ll explore how they manifest, the warning signs that can help identify them early, and, most importantly, the strategies organizations can employ to mitigate the risks. By the end, you’ll have a clearer understanding of why addressing insider threats is crucial for ensuring the integrity of your cybersecurity measures and protecting the valuable assets that keep your organization running. 𝗜𝗻𝘀𝗶𝗱𝗲𝗿 𝗧𝗵𝗿𝗲𝗮𝘁𝘀 𝗮𝗻𝗱 𝗧𝗵𝗲𝗶𝗿 𝗜𝗺𝗽𝗮𝗰𝘁 𝗼𝗻 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 Insider threats are among the most complex and damaging cybersecurity challenges organizations face today. These threats can arise from a range of scenarios, including the misuse of privileged access or unintentional lapses in security protocols. 𝗥𝗘𝗔𝗗: https://bit.ly/4l7dibM #CanaryTrap #CyberSecurity #InsiderThreats #DataProtection #ThreatDetection

    • No alternative text description for this image
  • At Canary Trap, our mission is clear: to help organizations stay ahead of evolving cyber threats through true adversarial security testing. We understand that in today’s rapidly shifting threat landscape, proactive offensive security is essential to identifying and mitigating risks before they can be exploited.   But we don’t just identify vulnerabilities—we provide actionable insights and strategic guidance to strengthen your security posture. As your trusted partner, we take a hands-on approach to solving complex enterprise security challenges with precision, expertise, and a commitment to real-world threat simulation.   Our focus is on:  • 𝐀𝐝𝐯𝐞𝐫𝐬𝐚𝐫𝐢𝐚𝐥 𝐓𝐞𝐬𝐭𝐢𝐧𝐠: Simulating real-world attacks to uncover vulnerabilities before threat actors do. • 𝐓𝐚𝐢𝐥𝐨𝐫𝐞𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐒𝐭𝐫𝐚𝐭𝐞𝐠𝐢𝐞𝐬: Delivering actionable findings that align with your organization’s risk profile and business objectives. • 𝐒𝐭𝐫𝐚𝐭𝐞𝐠𝐢𝐜 𝐏𝐚𝐫𝐭𝐧𝐞𝐫𝐬𝐡𝐢𝐩: Working closely with your team to enhance resilience and improve long-term security outcomes. At Canary Trap, we go beyond traditional assessments—we think and act like real attackers to help you build a stronger defense. Let’s work together to secure your organization against the threats of tomorrow.   #CyberSecurity #PenetrationTesting #RedTeam #EthicalHacking #CanaryTrap

    • No alternative text description for this image
  • A critical PHP vulnerability, CVE-2024-4577, affecting Windows-based PHP installations, has been actively exploited worldwide since its disclosure in June 2024. Initially believed to be primarily targeting Japan, recent telemetry from GreyNoise confirms that mass exploitation has extended to multiple countries, including the United States, United Kingdom, Singapore, Germany, and India. The vulnerability enables remote code execution (RCE), making it a significant threat to compromised systems. Cisco Talos recently reported that an unknown threat actor leveraged CVE-2024-4577 for initial access in targeted attacks against Japanese organizations in the telecom, technology, and education sectors, using Cobalt Strike’s TaoWu plug-ins for post-exploitation activities. GreyNoise’s data indicates that the vulnerability has been exploited at a large scale, with notable attack spikes occurring in January and February 2025. The company observed 1,089 unique IP addresses launching attacks in January alone, with more than 40% of these originating from Germany and China. Attackers appear to be conducting automated scans for vulnerable targets, suggesting a coordinated effort behind the increasing number of incidents. Security researchers warn that exploitation of CVE-2024-4577 is not limited to credential theft but could also involve privilege escalation and long-term persistence, potentially leading to more sophisticated cyber intrusions. The widespread nature of these attacks underscores the importance of patching vulnerable PHP installations, strengthening network monitoring, and implementing proactive security measures to mitigate the risk of compromise. Wright, Rob. 2025. “Critical PHP Vulnerability Under Widespread Cyberattack.” Cybersecurity Dive. Mar. 10. 𝗥𝗘𝗔𝗗: https://bit.ly/4l1M71S #CanaryTrap #CyberSecurity #PHPVulnerability #CyberThreats

    • No alternative text description for this image
  • How many spam calls or texts do you get daily? Protecting your phone isn’t just a good idea—it’s a necessity.

    View organization page for Canary Trap

    1,606 followers

    Our smartphones are more than just gadgets—they are lifelines. From banking and healthcare to personal conversations and business operations, they hold the keys to our digital lives. But while we rely on them for convenience, cybercriminals see them as prime targets, exploiting vulnerabilities to steal data, infiltrate networks, and compromise security. Unlike traditional computers, mobile devices are constantly connected, syncing across multiple platforms, downloading third-party apps, and accessing unsecured networks. This seamless integration is what makes them both powerful and dangerously exposed. A single malicious link, an infected app, or an unsecured public Wi-Fi connection can grant hackers access to a world of sensitive information—often without the user realizing it. In this blog, we’ll dive deep into the evolving landscape of mobile security, uncovering the most prevalent threats, attack methods, and defensive strategies. Whether you're an individual looking to safeguard your personal data or an enterprise managing hundreds of corporate devices, understanding how to defend against modern mobile threats is essential. Let’s explore how to stay one step ahead in the battle for mobile security. 𝗧𝗵𝗲 𝗥𝗶𝘀𝗶𝗻𝗴 𝗧𝗵𝗿𝗲𝗮𝘁 𝗟𝗮𝗻𝗱𝘀𝗰𝗮𝗽𝗲 𝗶𝗻 𝗠𝗼𝗯𝗶𝗹𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 Mobile devices have become so ingrained in our daily lives that they’re now a top target for cybercriminals. The widespread adoption of mobile banking, the surge in work-from-home arrangements, and the expansion of cloud storage have all made smartphones prime entry points for attacks. Mobile devices are now not only used for personal communication but also for financial transactions, business operations, and accessing sensitive cloud-based data, making them critical to both individuals and busine𝘀ses. 𝗥𝗘𝗔𝗗: https://bit.ly/4iqgwWa #CanaryTrap #MobileSecurity #CyberSecurity #DataProtection

    • No alternative text description for this image
  • Our smartphones are more than just gadgets—they are lifelines. From banking and healthcare to personal conversations and business operations, they hold the keys to our digital lives. But while we rely on them for convenience, cybercriminals see them as prime targets, exploiting vulnerabilities to steal data, infiltrate networks, and compromise security. Unlike traditional computers, mobile devices are constantly connected, syncing across multiple platforms, downloading third-party apps, and accessing unsecured networks. This seamless integration is what makes them both powerful and dangerously exposed. A single malicious link, an infected app, or an unsecured public Wi-Fi connection can grant hackers access to a world of sensitive information—often without the user realizing it. In this blog, we’ll dive deep into the evolving landscape of mobile security, uncovering the most prevalent threats, attack methods, and defensive strategies. Whether you're an individual looking to safeguard your personal data or an enterprise managing hundreds of corporate devices, understanding how to defend against modern mobile threats is essential. Let’s explore how to stay one step ahead in the battle for mobile security. 𝗧𝗵𝗲 𝗥𝗶𝘀𝗶𝗻𝗴 𝗧𝗵𝗿𝗲𝗮𝘁 𝗟𝗮𝗻𝗱𝘀𝗰𝗮𝗽𝗲 𝗶𝗻 𝗠𝗼𝗯𝗶𝗹𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 Mobile devices have become so ingrained in our daily lives that they’re now a top target for cybercriminals. The widespread adoption of mobile banking, the surge in work-from-home arrangements, and the expansion of cloud storage have all made smartphones prime entry points for attacks. Mobile devices are now not only used for personal communication but also for financial transactions, business operations, and accessing sensitive cloud-based data, making them critical to both individuals and busine𝘀ses. 𝗥𝗘𝗔𝗗: https://bit.ly/4iqgwWa #CanaryTrap #MobileSecurity #CyberSecurity #DataProtection

    • No alternative text description for this image
  • Welcome to Canary Trap’s “Bi-Weekly Cyber Roundup”. At Canary Trap, it is our mission to keep you up-to-date with the most crucial news in the world of cybersecurity, and this bi-weekly publication is your gateway to the latest news. In this week's round-up, we explore the latest cybersecurity threats and emerging attack techniques. From OBSCURE#BAT malware deploying rootkits via fake CAPTCHA pages, to a new AI jailbreak method that bypasses safeguards across multiple models, and adversaries continuing to evolve their tactics. We’ll also cover a sophisticated Microsoft 365 phishing scam, the persistent risks posed by remote access infrastructure, and KPMG Canada's warning about rising fraud and cybersecurity threats amid shifting supply chains. Finally, we’ll examine how researchers bypassed ChatGPT’s protections using hexadecimal encoding and emojis. 𝗥𝗘𝗔𝗗: https://bit.ly/41wG4cS #CyberRoundup #CanaryTrap #LatestNews #DigitalDefense #CyberSecurity

    • No alternative text description for this image
  • 🎉 𝐁𝐫𝐞𝐚𝐤𝐢𝐧𝐠 𝐍𝐞𝐰𝐬! 🎉 Canary Trap is excited to welcome the incredible Anisa Ringler-Scott as our new Business Operations Manager! 🚀✨ Anisa is bringing her expertise in streamlining processes, optimizing efficiency, and keeping everything running like a well-oiled machine. 🔧⚙️ With her at the helm of operations, we’re leveling up our ability to deliver seamless, top-tier offensive security (penetration) testing and advisory services. Her attention to detail, strategic mindset, and passion for excellence make her the perfect addition to our team. We can’t wait to see the impact she’ll make! Welcome aboard, Anisa! Let’s keep pushing the boundaries of cybersecurity together. 🛡️💡 #NewHire #WelcomeAnisa #CanaryTrap #OffensiveSecurity #PenetrationTesting

    • No alternative text description for this image
  • Hack-for-hire services are reshaping the cybercrime landscape, making cyberattacks more accessible to governments, corporations, and individuals. This emerging industry blurs the line between ethical cybersecurity work and outright criminal activities, with some groups selling hacking tools under the guise of security research. The rise of AI-driven hacking and economic desperation among unemployed tech workers has further fueled the growth of cyber mercenaries, making sophisticated cyberattacks easier to execute and harder to regulate. The distinction between legitimate penetration testing and illicit cyber mercenary work is increasingly difficult to define. While ethical hackers operate under strict guidelines, others exploit legal loopholes to engage in corporate espionage, data theft, and political surveillance. High-profile cases, such as the misuse of NSO Group’s Pegasus spyware and the UAE’s Project Raven, highlight how security tools can be turned against their intended purpose. With governments struggling to enforce laws across international borders, cyber mercenaries often operate with near-total impunity. Addressing this crisis requires stronger global cooperation, stricter regulations, and increased vetting of cybersecurity firms to prevent ties to illicit hacking operations. As AI-driven cyber tools continue to evolve, the unchecked growth of cyber mercenaries threatens digital security, privacy, and geopolitical stability. Without decisive action, cyberspace risks becoming dominated by an unregulated shadow industry that enables corporate espionage, state-sponsored hacking, and widespread cybercrime. Sayegh, Emil. 2025. “How ‘Hack For Hire’ Mercenaries Are Reshaping Cybersecurity Crime.” Forbes. Mar. 11. 𝗥𝗘𝗔𝗗: https://bit.ly/4iG1ICe #CanaryTrap #CyberCrime #HackForHire #CyberSecurity #DigitalDefense

    • No alternative text description for this image

Similar pages

Browse jobs