Got questions? This way.

FAQs, quick fixes, and official info on every feature.
Can't find your question here, feel free to contact us.

General questions:

FINDBUG, a cybersecurity powerhouse offering Penetration Testing, Security Hardening, Incident Response, Compliance, Cyber Hygiene, and Training

At FINDBUG, we begin with a comprehensive risk assessment and discovery session to understand your company’s infrastructure, digital assets, industry-specific threats, and compliance requirements. Whether you need penetration testing, cloud security audits, endpoint hardening, or awareness training, our experts will guide you through a recommendation process. We prioritize practical solutions aligned with your business goals, helping you address critical vulnerabilities without overcomplicating or overspending on unnecessary tools.

We offer both options to fit your business needs. For clients looking to validate their security posture at a given point in time, we provide one-time services such as penetration testing, security audits, and incident response. However, for organizations seeking ongoing protection, FINDBUG offers continuous monitoring solutions, including external attack surface monitoring, managed vulnerability scanning, and real-time alerting via our platform. This hybrid approach ensures that whether you're launching a new product or managing long-term risk, you stay one step ahead of evolving cyber threats.

We follow strict guidelines and pre-approved scopes to ensure that testing won’t disrupt your production systems. Our team uses safe, non-destructive methods and communicates every step clearly with your IT team. We’ve worked with everything from media platforms to financial services and know how to keep things running smoothly while exposing critical weaknesses before attackers do. If needed, we can run tests in staging environments too.

We provide a full range of cybersecurity services—from penetration testing and security hardening to incident response, compliance audits, and cyber hygiene training. Whether you're securing a cloud setup, preparing for ISO certification, or looking to build a more resilient team through awareness training, we cover it all under one roof.

We’ve worked with clients in fintech, media, telecom, enterteiment, education, health, and government sectors. Each has unique challenges, and we’ve adapted our methods to meet the demands of legacy systems, high availability, or strict compliance. Through bug bounties done by our staff we have supported Fortune 500 companies identifying and remediating a hundreds of vulnerabilities on their systems.

First, isolate the affected systems if you can. Then call us. The earlier you get help, the better the outcome. We’ll guide you through containment, evidence collection, and recovery in a way that minimizes

Defensive Security:

Security Hardening with us includes reviewing your existing architecture, eliminating unnecessary exposure, configuring firewalls and endpoints securely, and applying best practices across operating systems, network devices, and apps.

Definitely. We help companies move toward a Zero Trust model by redesigning infrastructure, improving access controls, isolating workloads, and integrating with solutions like EDRs, firewalls, and identity providers.

Yes, we work with EDR platforms, configure SIEMs for log correlation and detection, and optimize firewall rules. Whether you use open-source tools or enterprise-grade solutions, who may be our partners we can support and improve your setup.

Absolutely. We perform cloud audits on AWS, Azure, and GCP. That includes reviewing IAM permissions, storage policies, security groups, and workload configurations to ensure everything’s locked down.

Yes. Our work aligns with NIST CSF, ISO 27001, SOC 2, and GDPR. We often help clients map current controls against those frameworks, spot the gaps, and prepare for third-party audits.

We combine technical depth, real-world hacker tactics, and a collaborative style. We’re known for being hands-on, fast to respond, and focused on results, not fluff. Our clients stay because we deliver what matters.

Forensics & Incident Response

FINDBUG has become the go-to address for Incident Response and Digital Forensics across the Balkans. 

We typically respond within hours, depending on urgency. If you're on a retainer or pre-approved emergency plan, we’re ready to jump in fast. We prioritize response based on impact and scale and your company legal and approval readiness. Over the years, we’ve led the response to some of the most critical ransomware attacks in the region,  auditing compromised environments and, in several cases, successfully recovering encrypted data. Our team includes certified forensic investigators with dozens of internationally recognized credentials, bringing deep expertise and rapid action when every minute counts. Whether it's uncovering how an attack happened or helping businesses bounce back, we're trusted by those who need answers fast.

Yes. After containment, our team of certified forensic experts dig into logs, memory, and traffic data to understand what happened, how it happened, and how to prevent it from happening again. You’ll get a full incident report with actionable

If the data is still on the system and not completely wiped or re-encrypted, yes—we can often recover it. But success depends on the ransomware type, backup availability, and system integrity. We’ll assess and advise accordingly.

Yes, we assist organizations in preparing documentation, controls, and internal processes for audits like ISO 27001, SOC 2, or local data protection compliance. We’ve supported both first-time certifiers and mature organizations going through. Our company counts 5 active ISO 27001 Lead Auditors and Implementers from PECB.

Our sessions typically include threat overviews, real-world examples, phishing detection, password hygiene, and secure use of personal devices. We keep things practical, not theoretical, so everyone walks away more secure.Some clients prefer in-person training to better engage their teams, while others opt for virtual sessions to accommodate remote staff, we do both. Either way, our sessions are interactive and based on real-world attack simulations.