Help
RSS
API
Feed
Maltego
Contact
Domain > www.wizlynxgroup.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2017-07-20
107.154.103.53
(
ClassC
)
2018-09-15
107.154.102.53
(
ClassC
)
2024-07-15
104.26.13.174
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Mon, 15 Jul 2024 06:04:27 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Mon, 15 Jul 2024 07:04:27 GMTLocation: https://www.wizlynxgroup.com/Report-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?s2KXiZkLMC3obHsKo1ygXgTp%2FFYHkG4BUHqUUHDV8NsHmqt1yYEnVDtNCdqto3JZQBn6dDs5IVRK0id%2Bd4CIFp5mnsX78PL617Irrqh0US2B2sPCerpYdNUeSXgnEPFY86vWaxPU7},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8a378e1d7ffbc731-SEA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 15 Jul 2024 06:04:27 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-alivex-frame-options: DENYlast-modified: Tue, 02 Apr 2024 17:01:40 GMTvary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?skdzlff%2BgxT9OKfg0mlCMJdmH4r2AQmO6BwIb3RXMro7bCA1InXmw4sd6W%2FRI0OD8HImrJ2m%2BAr2IWB6mVfqkZEweDpbia8PCV3Zgt8Om7ZsW3on6zIEC4STQi1uaHI3KV8hGvN%2BW},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8a378e1dec7827a8-SEA !DOCTYPE html>html langen>head>meta charsetUTF-8 />meta namedescription contentYour IT Security Provider in Switzerland for Cyber Security, Penetration Test and Ethical Hacking, Managed Security Services, and Project Management />meta namegoogle-site-verification contentjLmFlh1dEEe2GFEgmfb2cxeqD6awH7Bg20ygS6oJ88A />meta namegoogle-site-verification contentKIbcKCNMudpnVTFiCGGzvZOlZ7MrETULaX_8xuHrDv4 />meta contentwidthdevice-width, initial-scale1, maximum-scale1 nameviewport />title>Cyber Security Services | wizlynx group/title>link relalternate hrefhttps://www.wizlynxgroup.com/br/ hreflangpt-BR />link relalternate hrefhttps://www.wizlynxgroup.com/hk/en/ hreflangen-HK />link relalternate hrefhttps://www.wizlynxgroup.com/hk/zh/ hreflangzh-HK />link relalternate hrefhttps://www.wizlynxgroup.com/ hreflangx-default />link relalternate hrefhttps://www.wizlynxgroup.com/ch/fr/ hreflangfr-CH />link relalternate hrefhttps://www.wizlynxgroup.com/ch/de/ hreflangde-CH />link relalternate hrefhttps://www.wizlynxgroup.com/de/ hreflangde-DE />link relalternate hrefhttps://www.wizlynxgroup.com/mx/ hreflanges-MX />link relalternate hrefhttps://www.wizlynxgroup.com/my/ hreflangen-MY />link relalternate hrefhttps://www.wizlynxgroup.com/sg/ hreflangen-SG />link relalternate hrefhttps://www.wizlynxgroup.com/us/ hreflangen-US />link href/content/images/favicons/favicon.ico relicon />link href/content/images/favicons/favicon-152.png sizes152x152 relapple-touch-icon-precomposed />link href/content/images/favicons/favicon-120.png sizes120x120 relapple-touch-icon-precomposed />link href/content/images/favicons/favicon-72.png sizes72x72 relapple-touch-icon-precomposed />link href/content/images/favicons/favicon-57.png relapple-touch-icon-precomposed />link typetext/css relstylesheet hrefhttps://fonts.googleapis.com/css?familyRoboto:300,400,500,700 />link href/content/css/bootstrap.min.css relstylesheet />link href/content/js/smartmenus-1.0.0/addons/bootstrap/jquery.smartmenus.bootstrap.css relstylesheet />link href/content/css/font-awesome.min.css relstylesheet />link href/content/css/font-awesome-v4-shims.css relstylesheet>link href/content/css/styles.css relstylesheet />link href/content/css/responsive.css relstylesheet />!--if lt IE 9> script src//cdnjs.cloudflare.com/ajax/libs/html5shiv/r29/html5.min.js>/script> !endif-->script typee243f0902d9537fadae035b4-text/javascript> window.cookieconsent_options { message: The wizlynx group website stores cookies on your computer, tablet or smartphone. Your personal data will not be tracked., dismiss: Got it!, learnMore: Privacy Page, link: https://www.wizlynxgroup.com/privacy, theme: dark-bottom }; /script>script src/content/js/cookieconsent.min.js typee243f0902d9537fadae035b4-text/javascript>/script>style> .image { position: relative; overflow: hidden; padding-bottom: 100%; } .image img { position: absolute; } .wp_caption { background-color: rgba(194, 30, 58, 0.7); bottom: 0; color: white; position: absolute; vertical-align: bottom; padding: 8px; width: 100%; } /style>/head>body>header idhome classheader>div rolenavigation classnavbar-fixed-top sticky-navigation>div classcontainer stylemin-height: 70px;text-align: left>div classnavbar-header styledisplay: inline-block>a href./ classnavbar-brand>script typetext/javascript styledisplay:none>//!CDATAwindow.__mirage2 {petok:Hm.gIHvgdpLJfzo1rS2fMvRAqqhmBRzs1UWX7zPfTlY-1800-0.0.1.1};//>/script>script typetext/javascript srchttps://ajax.cloudflare.com/cdn-cgi/scripts/04b3eb47/cloudflare-static/mirage2.min.js>/script>img altwizlynx group Logo data-cfsrc/content/images/logo-nav.png styledisplay:none;visibility:hidden; />noscript>img altwizlynx group Logo src/content/images/logo-nav.png/>/noscript>/a>/div>div classpull-right social-container>div classsocial-icons-header style>a hrefhttps://www.facebook.com/pages/wizlynx-group/166294663422930>span classfa fa-facebook>/span>/a>a hrefhttps://twitter.com/wizlynxgroup>span classfa fa-twitter>/span>/a>a hrefhttps://www.linkedin.com/company/wizlynx-group>span classfa fa-linkedin>/span>/a>a hrefhttps://www.xing.com/companies/wizlynxag>span classfa fa-xing>/span>/a>/div>a styleborder-radius: 3px;padding: 6px 15px 6px;font-size: 12px;vertical-align: top classnavbar-career-button hidden-xs href/careers>Careers/a> a styleborder-radius: 3px;padding: 6px 15px 6px;font-size: 12px;vertical-align: top classnavbar-register-button hidden-xs hrefcontact>Contact Us/a>/div>/div>div classultradark-bg>div classcontainer>div classnavbar stylemargin-bottom: 0>div classnavbar-header>a style classnavbar-register-button contact-xs hrefcontact>Contact Us/a>a stylemargin-left: 100px; classnavbar-career-button contact-xs href/careers>Careers/a>button typebutton classnavbar-toggle collapsed data-togglecollapse data-target#bs-example-navbar-collapse-1>span classsr-only>Toggle navigation/span>span classsmall-text white-text styledisplay: inline-block>menu/span>div styledisplay: inline-block>span classicon-bar>/span>span classicon-bar>/span>span classicon-bar>/span>/div>/button>/div>div classcollapse navbar-collapse idbs-example-navbar-collapse-1>ul classnav navbar-nav navbar-left main-navigation small-text>li class>a stylecolor: white href# class>Solutionsspan classcaret>/span>/a>ul classdropdown-menu>li>a hrefcyber-security/security-assessments-and-audits>Security Audits & Pentest/a>/li>li>a hrefcyber-security/targeted-cyber-threat-intelligence>Cyber Threat Intelligence/a>/li>li>a hrefcyber-security/cyber-incident-response-service>Cyber Security Incident Response Team/a>/li>li>a hrefcyber-security/cyber-security-incident-detection-services>Cyber Security Incident Detection Services/a>/li>li>a hrefcyber-security/cyber-defense-services>IT Security/a>/li>li>a hrefcyber-security/cyber-defense-services>Cyber Defense Services/a>/li>li class>a hrefcomplementary-services class>Complementary Servicesspan classcaret>/span>/a>ul classdropdown-menu>li classtest>a hrefit-quality-management>IT Quality Management/a>a hrefproject-management>Project Management/a>a hrefcomplementary-services#section5>Software Development/a>/li>/ul>/li>/ul>/li>li class>a stylepadding-right: 0; hrefspecials classexternal>Specialsspan classnew>NEW/span>/a>/li>li class>a hrefabout>About Us/a>/li>li class>a href/security-research-advisories/>Security Advisories/a>/li>li>a hrefhttps://www.wizlynxgroup.com/news/>News/a>/li>li class>a hrefpartners>Partners/a>/li>li>a hrefcontact classvisible-xs hidden-sm hidden-md hidden-lg>Contact Us/a>/li>/ul>ul classnav navbar-nav navbar-right main-navigation small-text>li classdropdown>a href# classdropdown-toggle data-toggledropdown>Global i classfa fa-globe stylefont-size: 24px; color: white;>/i>/a>ul classdropdown-menu>li class>a href/br/>Brazil/a>a href/de/>Germany/a>a href/my/>Malaysia/a>a href/mx/>Mexico/a>a href/sg/>Singapore/a>a href/ch/de/>Switzerland/a>a href/us/>USA/a>/li>li>a href# classdropdown-toggle data-toggledropdown>China span classcaret>/span>/a>ul classdropdown-menu>li>a hrefhttp://www.wizlynxgroup.cn>Beijing/a>/li>li>a hrefhttp://www.wizlynxgroup.cn>Shanghai/a>/li>li>a href/hk/en/>Hong Kong/a>/li>/ul>/li>/ul>/li>/ul>/div>/div>/div>/div>/div>div classoverlay-layer>div classcontainer>div classrow>div classcol-md-12>div classintro-section styletext-align: center>h1 classintro white-text>Cyber Security Services/h1>h4 classwhite-text>Yourstrong classcolored-text>Swiss Quality/strong> Cyber Security Partner Worldwide/h4>/div>/div>/div>/div>/div>style> .header .overlay-layer { height: auto; margin-top: 120px; padding-bottom: 80px; padding-top: 80px; } /style>/header>section id classunique-features white-bg>div classhiddenAnchor idsection2>/div>div classcontainer>div classsection-header data-wow-duration2.5s>div classsmall-text-medium uppercase colored-text>SECURITY SERVICES/div>h2 classdark-text>Westrong>Take Care/strong> ofstrong>Your Protection/strong>/h2>div classcolored-line>/div>div classsub-heading>360° Solutions to Protect your Business/div>/div>div classrow>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 >div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-user-secret colored-text fa-2x stylepadding-right: 10px>/span>Security Assessments/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Discover vulnerabilities as well as evaluate the risks and effectiveness of controls. Leave no stone unturned with wizlynxs Ethical Hacking & Penetration Testing services./p>p>a hrefcyber-security/security-assessments-and-audits classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 wow fadeInDown>div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-shield colored-text fa-2x stylepadding-right: 10px>/span>Cyber Defense Consulting/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Design and integration of security products spanning all layers (i.e. network, host, system, and application), which ensures full protection./p>p>a hrefcyber-security/cyber-defense-services classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 wow fadeInRight>div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-dashboard colored-text fa-2x stylepadding-right: 10px>/span>Cyber Defense Operation/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Full management and 24x7 monitoring of your security infrastructure and devices such as Firewalls, WAFs, Web Proxies, IDS/IPS, and more./p>p>a hrefcyber-security/cyber-defense-services#Cyber-Defense-Operations classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>/div>div classrow>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 wow fadeInUp>div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-bolt colored-text fa-2x stylepadding-right: 10px>/span>Cyber Security Incident Response/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Investigation and support by our Cyber SWAT team, from the containment to the eradication and recovery after a cyber attack.br/>br/>/p>p>a hrefcyber-security/cyber-incident-response-service classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 wow fadeInUp>div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-bullseye colored-text fa-2x stylepadding-right: 10px>/span>Cyber Threat Intelligence/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Get real time visibility into threat actors targeting your organisation to prepare for upcoming attacks and limit damages of successful hacks!/p>p>a hrefcyber-security/targeted-cyber-threat-intelligence classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>div data-wow-offset2 data-wow-duration2.5s classcol-md-4 wow fadeInUp>div classsingle-service>div classdescription text-left>h4 classdark-text>span classfa fa-eye colored-text fa-2x stylepadding-right: 10px>/span>Cyber Security Incident Detection/h4>div classgrey-line-short pull-left>/div>p classtext-left stylemargin-top: 20px>Suite of cyber security services, which provides our client with expert support in the detection, investigation and response to cyber-attacks.br/>/p>p>a hrefcyber-security/cyber-security-incident-detection-services classstrong standard-button-small btn-xs-small-font>Learn more/a>/p>/div>/div>/div>/div>/div>/section>section id classdark-white-bg unique-features>div classhiddenAnchor idsection7>/div>div classcontainer>div classsection-header data-wow-duration2.5s>h2 classdark-text>Yourstrong>Cyber Security/strong> Partnerstrong>Worldwide/strong>/h2>div classcolored-line>/div>/div>div classrow stylemargin-top:20px;>div classcol-xs-12 text-justify>p>wizlynx group is an ethical, trustworthy, and vendor agnostic Swiss cyber security provider on which you can rely on to effectively protect your business and trade secrets against any form of cybercrime, such as malware outbreak, malicious insiders, cyberattacks, cyber espionage, data leakage, and more.../p>p>We live and breathe cyber security! For this reason, we have designed a service portfolio that covers the entire risk management lifecycle to ensure our customer benefits the most from our passion and experience, but primarily to maximize their protection. It starts with security assessment, such as penetration testing & ethical hacking for mobile applications, web applications, networks, and systems, but also vulnerability assessments and secure code review. With our Information Security Assessments we evaluate the IT processes, governance and compliance (GRC), so that an integral security can be succeeded. We also provide design and integration of security products spanning all layers (i.e. network, host, system, and application) for a 360° protection. Finally, we offer managed security services (MSS) and emergency breach response for cyber security incidents with our cyber SWAT team./p>p>Our cyber security services rely on highly skilled security professionals & penetration testers with long-lasting experience in both defense and offense and holding the most recognised certifications in the industry./p>/div>/div>/div>/section>section classunique-features white-bg>div classcontainer>div classrow>div data-wow-offset2 data-wow-duration2.5s classcol-xs-12 wow fadeInUp>div classsingle-service stylepadding-bottom: 30px; margin-bottom: 15px;>div classdescription text-left>h3 classdark-text text-center>span classfa fa-user-secret colored-text fa-2x stylepadding-right: 10px>/span>Ethical Hacking & Penetration Testing Services/h3>div classgrey-line-short stylemargin: auto>/div>div classrow stylemargin-top: 30px;>div classcol-xs-12 col-sm-6 col-md-8 col-lg-8 text-center-xs>div>h3 stylemargin-bottom: 20px; classcolored-text text text-left>Leave No Stone Unturned!/h3>p class>IT Security is not a feature but a state of mind. It is our vocation. By adopting latest hacking methods and procedures in our security assessments, we offer the right assessment at the right place. We take care of your protection by searching and disclosing vulnerabilities before hackers do./p>div classrow>div classcol-md-6>a hrefcyber-security/penetration-testing-services classstrong standard-button-small btn-xs-small-font>Learn more/a>/div>div classcol-md-6 hidden-xs>div classtext-right>span classcolored-text text-uppercase small-text>strong stylefont-size: 16px; margin-right: 5px;>Watch Our New Video/strong>/span>img classhidden-xs altArrow picture data-cfsrc/content/images/arrow.png styledisplay:none;visibility:hidden; />noscript>img src/content/images/arrow.png classhidden-xs altArrow picture/>/noscript>/div>/div>/div>/div>/div>div classcol-xs-12 col-sm-6 col-md-4 col-lg-4 xs-margin-top-15>div classyoutube data-embedFcvanvDULJI>div classplay-button>/div>/div>/div>div classcol-xs-12 hidden-sm hidden-md hidden-lg hidden-xl stylemargin-top:15px;>span classcolored-text text-uppercase small-text text-center>strong stylefont-size: 16px; margin-right: 5px;>Watch Our New Video/strong>/span>/div>/div>/div>/div>/div>/div>/div>/section>section classdark-white-bg styleposition: relative>img classhidden-xs styledisplay:none;visibility:hidden; altFeatured data-cfsrc/content/images/banner.png data-cfstyleposition: absolute;left: -5px;top:-6px; />noscript>img src/content/images/banner.png classhidden-xs styleposition: absolute;left: -5px;top:-6px; altFeatured/>/noscript>div classcontainer>div classrow>div classsection-header data-wow-duration2.5s>h2 classdark-text>strong>PwnTillDawn/strong> Online Battlefield/h2>div classcolored-line>/div>div classsub-heading>Training the future Cyber Warriors/div>/div>/div>div classrow>div classcontainer single-service>div data-wow-duration1.75s data-wow-offset20 classcol-xs-12 col-sm-4 col-sm-push-8 wow fadeInRight >img classimg-responsive altPwnTillDawn CTF Logo data-cfsrc/content/images/logo_online_battlefield.png styledisplay:none;visibility:hidden; />noscript>img classimg-responsive altPwnTillDawn CTF Logo src/content/images/logo_online_battlefield.png/>/noscript>/div>div data-wow-duration1.75s data-wow-offset20 classcol-xs-12 col-sm-8 col-sm-pull-4 xs-margin-top>p class>strong stylecolor: #ff9913> PwnTillDawn/strong> is a concept developed by wizlynx group to provide a safe environment for beginners but also experienced penetration testers to practice their offensive security skills in a 100% online pentest laboratory full of vulnerable machines. The goal is simple, find as many flags as possible, learn, and have fun along the way!/p>p>In addition to our continuous penetration testing network composed of 40+ machines, we organise regularly online and onsite CTF competitions allowing participants to put their skills to the test but also meet other people sharing the same passion for offensive security and CTFs./p>/div>/div>/div>div classrow styletext-align: center>a classbtn btn-danger href/pwntilldawn-ctf/>More Information/a>/div>/div>/section>a href classcd-top>Top/a>footer classfooter ultradark-bg lg-padding>div classcontainer stylecolor: #6f6f6f>div classrow>div classcol-xs-12 col-lg-3>img altwizlynx group | IT Security Services classimg-responsive data-cfsrc/content/images/WhiteWithRed.png styledisplay:none;visibility:hidden; />noscript>img altwizlynx group | IT Security Services classimg-responsive src/content/images/WhiteWithRed.png/>/noscript>/div>/div>hr/>div classrow>div classxs-no-float small-text col-lg-6 text-left>©2024span classwhite-text>wizlynx group/span> - All Rights Reserved/div>div classxs-no-float col-lg-6>ul classfooter-links small-text text-right>li>a classwhite-text hrefterms-of-use>Terms of Use/a>/li>li>a classwhite-text hrefprivacy>Privacy/a>/li>li>a classwhite-text hrefsocial-responsibility>Social Responsibility/a>/li>/ul>/div>/div>/div>script typee243f0902d9537fadae035b4-text/javascript> (function (i, s, o, g, r, a, m) { iGoogleAnalyticsObject r; ir ir || function () { (ir.q ir.q || ).push(arguments) }, ir.l 1 * new Date(); a s.createElement(o), m s.getElementsByTagName(o)0; a.async 1; a.src g; m.parentNode.insertBefore(a, m) })(window, document, script, //www.google-analytics.com/analytics.js, ga); ga(create, UA-64955363-1, auto); ga(send, pageview); /script>script typeapplication/ld+json> { @context: https://schema.org, @type: Corporation, name: wizlynxgroup, url: https://www.wizlynxgroup.com/, logo: https://www.wizlynxgroup.com/content/images/logo-nav.png, sameAs: https://www.facebook.com/wizlynxgroup/, https://twitter.com/wizlynxgroup, https://www.linkedin.com/company/wizlynx-group/mycompany/, https://www.wizlynxgroup.com/ } /script>/footer>script async srchttps://www.googletagmanager.com/gtag/js?idAW-962084388 typee243f0902d9537fadae035b4-text/javascript>/script>script typee243f0902d9537fadae035b4-text/javascript> window.dataLayer window.dataLayer || ; function gtag() { dataLayer.push(arguments); } gtag(js, new Date()); gtag(config, AW-962084388); /script>script src/content/js/jquery-3.6.0.min.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/content/js/jquery-migrate-3.3.2.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/content/js/jquery.nav.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/content/js/bootstrap.min.js typee243f0902d9537fadae035b4-text/javascript>/script>script typee243f0902d9537fadae035b4-text/javascript src/content/js/smartmenus-1.0.0/jquery.smartmenus.min.js>/script>script typee243f0902d9537fadae035b4-text/javascript src/content/js/smartmenus-1.0.0/addons/bootstrap/jquery.smartmenus.bootstrap.min.js>/script>script src/content/js/jquery.simple-text-rotator.min.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/content/js/wow.min.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/content/js/site.js typee243f0902d9537fadae035b4-text/javascript>/script>script src/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js data-cf-settingse243f0902d9537fadae035b4-|49 defer>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]