top of page

Reactive
SERVICES
Incident response

Incident Response
Execution of response actions to an already confirmed cyber incident, including detection and analysis, containment, eradication, recovery, and post-incident stage activities.

Incident inspection
Incident Inspection
Execution of triage and initial analysis to confirm or deny the existence of a cyber incident.
Digital forensic

Digital Forensics
Collection and analysis of forensic evidence relating to a cyber incident.
Malware Analysis

Malware Analysis
Analysis of malware to determine its behaviour and capabilities.
LV HQ
CYBER CIRCLE
LATVIA
For incident response
For inquiries
©2025 CYBER CIRCLE. All Rights Reserved.
bottom of page