ββ[ionsec@dfir-lab]β[~]
ββββΌ $ cat /etc/identity
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β NAME Β· Nir Halfon β
β ROLE Β· Founder & CEO β IONSEC Cyber Security β
β FOCUS Β· Digital Forensics & Incident Response (DFIR) β
β BASED Β· Israel Β· Operating globally β
β CAREER Β· 20+ years in cybersecurity β
β β
β PRIOR Β· Head of DFIR β Israel National Cyber Directorate β
β Β· Senior Security Analyst β Dell EMC β
β β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[+] Currently β Leading IR engagements against advanced threat actors
[+] Currently β Building DFIR tooling at github.com/ionsec
[+] Researching β Cloud forensics Β· wiper malware Β· supply-chain attacks
[+] Mission β "Conquer the cyber world together."IONSEC is a boutique cybersecurity firm built for organizations facing advanced threat actors β the kind that don't show up in commodity threat feeds.
We've logged 100,000+ hours of DFIR across IT, OT, and IoT environments, and we deliver everything from rapid incident response and forensic investigations to threat hunting, security assessments, and proactive research.
| π¨ Incident Response | π¬ Digital Forensics | π― Threat Hunting | π οΈ Custom DFIR Tooling |
|---|---|---|---|
| Rapid containment & eradication for active intrusions | Deep host, memory & cloud forensics on real cases | Adversary emulation & proactive detection engineering | Open-source tools shipped to the DFIR community |
| π‘οΈ Project | What It Does |
|---|---|
| π¨ Operation HANDALA | Public technical report + YARA detection rules for a sophisticated wiper-malware phishing campaign |
| π‘ DO Audit Log Scraper | Chrome extension extracting DigitalOcean audit logs with forensically precise timestamps |
| π₯ FlareInspect | Cloudflare security assessment CLI + web dashboard |
| π§° Forti-DFIR | DFIR toolkit for FortiGate / Fortinet investigations |
| π MAES Platform | Microsoft 365 / Entra ID forensics & investigation platform |
| π΅οΈ EntraScout | External + internal Microsoft 365 / Entra ID red-team recon with attack-chain mapping |
