Dorak

Dorak

Speciality: Comprehensive Penetration Testing (including Network, Web Application, Mobile, IoT, and Social Engineering)

Dois Irmãos, Brazil 3 employees
[01] About

Brazil-based cybersecurity firm specializing in penetration testing, vulnerability detection, and security strategy; 2 employees with 200% YoY growth; founded 2019; offers attack simulations, risk reduction, and strategic security solutions.

Especializada em segurança digital e simulações de ataques hacker, a Dorak é a sua parceira confiável na jornada de proteção digital. 🔍 Nossos Serviços: 🎯 Simulação de Ataque Hacker (Pentest): Descubra as vulnerabilidades dos seus sistemas e corrija-as. Evite perdas financeiras e acessos não autorizados, proteja informações confidenciais, previna interrupções nos negócios e mantenha a confiança de seus clientes. 🎣 Simulação de Ataque Phishing: Avalie como os colaboradores da organização reagem a tentativas de fraude e golpes. Proteja-se contra vazamentos de informações, instalações maliciosas e perdas financeiras, garantindo a integridade e a reputação da sua organização. 📚💡 Treinamento Contra Ataques Cibernéticos: Fortaleça sua equipe com conhecimento e habilidades essenciais para enfrentar ameaças digitais. Com nosso treinamento, seus colaboradores estarão equipados para identificar, reportar e evitar potenciais ataques, tornando sua organização menos vulnerável e mais resiliente contra cibercriminosos. Além disso, contamos com serviços de avaliação de vulnerabilidade, análise de código-fonte, auditoria e consultoria em cibersegurança 🌐 Fundada em 2019 pelo especialista em segurança cibernética Benjamin Mauss, com sede em Dois Irmãos RS, nossa equipe de hackers éticos já auxiliou mais de 100 organizações a se manterem seguras contra crimes cibernéticos. Transformando dados em segurança e confiança. Seja Dorak!
[02] Services
Simulation Of Hacker Attacks (pentest)
Advanced Intrusion Testing (pentest)
Vulnerability Assessment
Phishing Testing
Source Code Testing
Security Testing As A Business Strategy
Risk Reduction And Cost Reduction
Compliance Consulting (lgpd
GDPR
ISO 27001
PCI-DSS
Hipaa)
[03] Certifications
OSCP

Origin of the OSCP


The Offensive Security Certified Professional (OSCP) certification was created by Offensive Security, a company founded by Mati Aharoni and other security professionals in 2007. The certification was developed to address the gap between theoretical knowledge and practical penetration testing skills in the cybersecurity industry. Offensive Security designed the OSCP to be a hands-on, performance-based certification that requires candidates to demonstrate actual hacking skills in a controlled lab environment rather than simply answering multiple-choice questions.


Industry Value and Importance


The OSCP is highly valued in the cybersecurity industry because it proves that holders possess real-world penetration testing abilities. Unlike traditional certifications, the OSCP's 24-hour practical exam requires candidates to successfully compromise multiple machines in a simulated network environment and document their findings professionally. This hands-on approach has made it a gold standard for entry to intermediate-level penetration testers, and it's frequently requested or required by employers hiring for offensive security roles. The certification's difficulty and practical nature have earned it significant respect among security professionals and hiring managers.

OSWP

OSWP Cybersecurity Certification


Origin


The Offensive Security Wireless Professional (OSWP) certification was created by Offensive Security, the same company behind the renowned OSCP certification. Launched in 2008, the OSWP was developed to address the growing need for professionals skilled in wireless network security assessment. Offensive Security created this certification to provide hands-on, practical training in identifying and exploiting vulnerabilities in 802.11 wireless networks, maintaining their philosophy of "Try Harder" and emphasizing real-world penetration testing skills over theoretical knowledge.


Industry Value


The OSWP is valued in the cybersecurity industry because it demonstrates proven practical ability in wireless network penetration testing through a hands-on exam format. Unlike multiple-choice certifications, holders must successfully crack WEP and WPA/WPA2 encryption and document their methodology in a professional penetration testing report. This certification is particularly respected because it validates actual technical competency rather than memorization, making OSWP holders attractive candidates for penetration testing roles, security consulting positions, and network security positions where wireless infrastructure assessment is critical.

ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

LGPD
GDPR

GDPR Certification Overview


Origin


The General Data Protection Regulation (GDPR) was created by the European Union and came into effect on May 25, 2018. It was developed by the European Parliament and Council to modernize and unify data protection laws across all EU member states. The regulation was created in response to the rapid growth of digital technology and data processing, aiming to give individuals greater control over their personal data while establishing clear obligations for organizations that collect, store, and process such information.


Industry Value


GDPR compliance is highly valued in the industry because it demonstrates an organization's commitment to data privacy and security, which has become a critical business concern globally. Organizations with GDPR expertise can avoid substantial fines (up to €20 million or 4% of annual global turnover), maintain customer trust, and gain competitive advantages when doing business with European entities or handling EU citizens' data. Professionals with GDPR certification are in high demand as companies worldwide seek to ensure compliance, implement proper data protection frameworks, and avoid the legal, financial, and reputational risks associated with data breaches and non-compliance.

PCI-DSS

PCI-DSS Certification


Origin


The Payment Card Industry Data Security Standard (PCI-DSS) was created in 2004 by the major credit card companies: Visa, Mastercard, American Express, Discover, and JCB International. These companies formed the PCI Security Standards Council in 2006 to manage and evolve the standard. PCI-DSS was developed in response to growing concerns about credit card fraud and data breaches, establishing a unified security standard to protect cardholder data across all organizations that store, process, or transmit payment card information.


Industry Value and Importance


PCI-DSS compliance is critical for any business handling payment card transactions, as it reduces the risk of data breaches, fraud, and the significant financial and reputational damage that follows. Beyond being a contractual requirement from payment processors and card brands, maintaining PCI-DSS certification demonstrates an organization's commitment to security best practices. Non-compliance can result in substantial fines, increased transaction fees, loss of card processing privileges, and legal liability in the event of a breach. The standard has become a baseline security framework that many organizations use to strengthen their overall security posture, even extending its principles beyond payment card data protection.

HIPAA

HIPAA Compliance and Cybersecurity


HIPAA (Health Insurance Portability and Accountability Act) was enacted by the U.S. Congress and signed into law in 1996. The legislation was created to protect sensitive patient health information from being disclosed without patient consent or knowledge. The Security Rule, added in 2003, established national standards for protecting electronic personal health information (ePHI), requiring covered entities and their business associates to implement administrative, physical, and technical safeguards. While HIPAA itself is legislation rather than a certification, various organizations offer HIPAA compliance training and certification programs to help IT professionals understand and implement these requirements.


HIPAA compliance is critically important in healthcare IT because violations can result in severe penalties, ranging from $100 to $50,000 per violation, with annual maximums reaching $1.5 million. Beyond avoiding fines, HIPAA knowledge is valued because healthcare data breaches can expose sensitive patient information, damage organizational reputation, and erode patient trust. IT professionals with HIPAA expertise are highly sought after as healthcare organizations increasingly rely on digital systems for medical records, billing, and patient communication. Understanding HIPAA requirements helps ensure that healthcare systems are designed, implemented, and maintained with appropriate security controls to protect patient privacy in an era of growing cyber threats.

[05] Notable Clients
  • Microsoft
  • Google
  • AWS
  • Tecnopuc
  • Sebrae
  • StartupInLab
  • PEIEX
  • Inovativa
  • Fecomercio
  • Capital Empreendedor