-
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathabout.html
More file actions
349 lines (318 loc) · 16 KB
/
about.html
File metadata and controls
349 lines (318 loc) · 16 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
<!DOCTYPE html>
<html lang="en">
<head>
<link rel="canonical" href="https://cyb.ersecurity.com/index.html" />
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<!-- Page Thumbnail for Social Media -->
<meta property="og:image" content="images/emergency.png">
<meta property="og:title" content="Emergency Response Security Group">
<meta property="og:description" content="Boutique Cyber Security Services Since 1337">
<meta property="og:url" content="https://cyb.ersecurity.com">
<meta name="description" content="Emergency Response Security Group - Boutique Cyber Security Services Since 1337. Offering specialized services in incident response, offensive security, malware research, forensics, OSINT, incident response, and more.">
<meta name="keywords" content="cyber security, security, incident response, consultant, tech, technology, 1099, aggregation, attack, attacksurface, attackvectors, bash, blog, blogging, blueteam, brands, breach, bug bounty, bug sweeps, bugs, c programming, cats, cellphone, cellular, ceos, ceotalks, ceotips , cicd, ciso, cisolife, cisos, cloud, cloud security, cloud security engineer, cobol, computer security, consultant, consulting, corporations, crime, custom cyber security, cyber, cyber security analyst, cyber security architect, cyber security engineer, cyber security researcher, cyberattack, cyber attacks, cyber awareness, cyber awareness month, cybercrime, cyber criminals, cyber defense, cyber security, cyber warfare, dark web, data breach, data breach researcher, data breach, data breaches, datas ecurity, defense, digital footprint analysis, directorjobs, directors, economy, elastic, electric consulting, electric consulting llc, elk, email, emergency, emergency response, emergency response security group, employment, encoding, encryption, engineering, ethical hacking, ethical hackers, ethical hacking, executive, executive protection, experience, experience , exploit development, exploitation, exploits, footprint analysis, forensics, fortran, fraud, gdpr, go lang, google, hacker, hackers, hacking, hackingnews, hackingtools, hacks, healthcare, hipaa, hiring, hiring engineers, hiring talent, hiring tech, incident response, incident response, information security, information technology, infosec, infosecurity, intel, international law, investigations, ir, it security, security operations , cyber jobs, cyber security jobs, lead cyber security engineer, lead cyber security analyst, lead cyber security architect, lead cyber security researcher,cyber security linkedin, log aggregation, logging, malware, malware analysis, malware research, manager development, manager jobs, manager life, managers, marketing, monitoring, reverse engineering, network, network monitoring, network security, networkingskills, networksecurity, noc, offense, open-source skiptracing, pen testing, penetration testing, phishing, policy, privacy, privacy law, private investigation, program building, public investigation, python, recruiters, recruiting, reddit, redteam, research , resume , retainer service, retainer subscription, sales, scam, security, security architecture, security development, security law, security research, securityawareness, securitynews, securityprofessionals, securityresearch, senior cyber security engineer, senior cyber security analyst, senior cyber security architect, senior cyber security researcher, skiptrace, skiptracing, small business, smishing, soc, social engineering, socialengineering, spam, splunk, static code analysis, subscription service, tech, techcommunity, technology, technology blog, testing, texting, text messages, text messagespam, text messaging, threat, threat analysis, threat landscape, threat research, virus, vulnerability, worm, zero day, probono forensics, victim services, victim resources, stalking victim resources, stalking resources, restraining order resources, abuse help, stalker help, victim help, free help stalker, 1337 hacker, hackers, victim services, pro bono, digital forensics, crime, stalking, justice, evidence collection, law enforcement support, forensic analysis, emergency response security group, Rhiannon Williams, non-profit, victim support, digital evidence">
<meta name="author" content="Emergency Response Security Group">
<meta name="robots" content="index, follow">
<meta property="og:type" content="website">
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:title" content="Emergency Response Security Group">
<meta name="twitter:description" content="Cyber Security Since 1337">
<meta name="twitter:image" content="images/emergency.png">
<title>Emergency Response Security Group</title>
<script>
document.addEventListener('copy', function(e) {
e.preventDefault();
});
</script>
<script>
document.addEventListener('contextmenu', function(e) {
e.preventDefault();
});
</script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-QMLPX8RRD8"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-QMLPX8RRD8');
</script>
<style>
body {
font-family: 'Courier New', Courier, monospace;
margin: 0;
padding: 0;
background: #000000;
color: white;
text-align: left;
font-size: 20px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
}
header, main, footer {
padding: 10px;
text-align: left;
font-size: 20px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
margin-inline: 10vw;
}
header a,
main a {
color: #ff00e1;
text-decoration: none;
font-weight: normal;
text-align: left;
}
footer a {
color: #00FFC6;
text-decoration: none;
transition: color .2s ease;
}
nav {
font-family: Courier New', Courier, monospace;
color: #9999ff;
background: #000000;
display: flex;
justify-content: center;
font-size: 20px;
flex-wrap: wrap;
}
nav a {
font-family: Courier New', Courier, monospace;
color: white;
padding: 14px 20px;
text-decoration: none;
display: block;
font-size: 20px;
animation: fadeIn 2s ease-in-out;
}
nav a:hover {
font-family: Courier New', Courier, monospace;
background: #df1313;
color: green;
padding: 14px 20px;
text-decoration: none;
display: block;
font-size: 20px;
animation: pulse 1s infinite;
}
nav a:link { color: #00FFC6; }
nav a:visited { color: #00FFC6; }
@keyframes fadeIn {
from { opacity: 0; }
to { opacity: 1; }
}
@keyframes pulse {
0% { transform: scale(1); }
50% { transform: scale(1.1); }
100% { transform: scale(1); }
}
.content {
animation: slideIn 1s ease-in-out;
}
@keyframes slideIn {
from { transform: translateY(100px); opacity: 0; }
to { transform: translateY(0); opacity: 1; }
}
#services {
margin: 20px auto;
}
.services {
text-align: center;
color: white;
font-size: 20px;
}
.scroll {
text-align: center;
padding: 1px;
font-size: 20px;
font-family: "Courier New", Times, serif;
flex-wrap: wrap;
}
.links a {
color: #fc03a5;
text-decoration: none;
font-size: 20px;
}
.links a:hover {
font-family: "Courier New", Times, serif;
background: #ffe6ff;
color: #b00274;
text-decoration: underline;
font-size: 20px;
}
.home {
font-family: "Courier New", Times, serif;
text-align: center;
color: white;
font-size: 20px;
}
.exploit {
font-family: "Courier New", Times, serif;
text-align: center;
color: white;
font-size: 20px;
}
.container {
display: flex;
flex-wrap: wrap;
gap: 20px;
}
.column {
flex: 1;
min-width: 200px;
}
.checkbox {
display: grid;
flex-direction: column;
grid-template-columns: 1fr 1fr 1fr ;
align-items: center;
gap: 10px;
max-width: 300px;
margin: auto;
}
.checkbox div {
margin: 5px 0;
}
.services-list{
text-align:left;
margin-left:1.5rem;
list-style-position:inside;
}
table {
width: 100%;
border-collapse: collapse;
}
table, th, td {
border: 1px solid black;
}
th, td {
padding: 8px;
text-align: center;
}
.example {
background-color: blue;
color: #fc03a5;
}
@media (max-width: 600px) {
.checkbox {
grid-template-columns: 1fr;
}
nav a {
font-size: 14px;
}
body {
font-size: 14px;
}
}
</style>
</head>
<body>
<header>
<center>
<font size="2">
<pre>
.-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-.
offen\sive-s\ecurity♥\malware\researc\h♥foren\sics♥os\int♥inc\ident-r\esponse\♥threat\hunting\♥corpor\ate-esp\ionage-\investi\gation♥\
' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `
</pre>
</center>
<section id="home">
<div class="home">
<p>
<span style="font-family: "Courier New", Times, serif;">
<font size="8">E</font><font size="8">mergency </font><font size="10">R</font><font size="8">esponse </font><font size="10">S</font><font size="8">ecurity</font><font size="10"> G</font><font size="8">roup </font>
</span>
</div>
</section>
</p>
<font color="#FF00E1">
<center><font size="5"><b>Cyber Security since 1337 </b></font></font></center>
<nav>
<a href="https://cyb.ersecurity.com/index.html#home">Home</a>
<a href="https://cyb.ersecurity.com/about.html">About</a>
<a href="https://www.cyberwarfare.com/the-illusion-of-expertise/">Blog</a>
<a href="https://cyb.ersecurity.com/victimservices.html">Victim Support</a>
<a href="https://cyb.ersecurity.com/partners.html">Referrals</a>
<a href="https://www.linkedin.com/in/internetarchaeology/">Contact</a>
</div>
</nav>
</div>
</section>
<center>
<font size="2">
<pre>
.-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-.
secur\ity-res\earch♥t\hreat-h\unting♥\reverse\engineer\♥inves\tigatio\ns♥scri\pting♥l\inux-uni\x♥host\ing♥reg\istrars\exploit\s♥vuln♥\
' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `
</pre>
</font>
</center>
</header>
<main>
</center>
</b>
<font color="orange"><b><h2><p>Rhiannon Williams-Hughes</p></font></h2>
</b><br>
<br>
<br>Rhiannon is a seasoned cybersecurity engineer and the founder of Emergency Response Security Group. She brings deep expertise across corporate security, email security, phishing and malware investigations, penetration testing, red team operations, forensics, incident response, and corporate espionage inquiries. Her background includes leading security programs in telecommunications, government, defense, gaming, retail, and financial services, with senior roles in both public and private sectors. She is focused on scaling the company to expand its enterprise reach.
<center>
<br>
<div style="position: relative;">
<img src="images/rhiannon.png" alt="Emergency Response Security Group">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
<br>
</center>
<font color="orange"><b><h2><p>~*~*~*~ About Rhiannon ~*~*~*~</p></font></h2><br>
<br><br>I have found I am most effective in positions with clear authority and accountability, where I can drive outcomes without unnecessary friction by lesser technologists. I work with organizations that need support in email and operational cyber security. I am highly effective in high pressure situations, maintain strict discretion, and apply deep expertise across digital landscapes, open source intelligence, corporate investigation, malware analysis, and phishing defense. My approach is hands on and outcome driven, focused on strengthening your security posture and ensuring your operations run smoothly.
<br><br>
My goal is to help medium-large sized companies with their cyber security efforts. I bring 27 years of experience in cybersecurity and operate an established LLC. I existed before the bloatware, and before AI proved repeatable inefficiency. In fact, my entire craft is built on accuracy, an art-form that has been lost. My goal would be to support you, your organization, show marked improvement.
<br><br>
A conversation is welcome should you want to explore how I can support your organization. My standard terms are net 15, with an upfront engagement of half of one month to initiate services. I am based remote out of Oregon, and can work domestically from any US State. Travel optional.
<br><br>
There are an overwhelming number of solutions out there for any one thing, and what I'm finding is that those of us who know what were are doing are still fairly rare, thus I seek a signed engagement, 40 hours/week, for 1 calendar year of consulting.
<br><br>
Business <a href="https://cyb.ersecurity.com/partners.html">partners and referrals.</a>
<br><br>
<center>
<div style="position: relative;">
<img src="images/rhiannon-02-2026.jpg" alt="Emergency Response Security Group">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
</div>
</center>
* <a href="https://www.cyberwarfare.com/the-illusion-of-expertise">The Illusion of Expertise - cyberwarfare.com</a>
<br>
* <a href="https://www.cyberwarfare.com/4-million-bad-decisions-the-data-breach-every-american-should-know-about">Four Million Bad Decisions - cyberwarfare.com</a>
</div>
<br>
<center><p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p></center>
<br>
✧ ༺ ☦ ༻ ✧<font color="blue"><b><font size="5"><p>Proud sponsor of the 2025 KofC Golf Tournament</p></font> </font>✧ ༺ ☦ ༻ ✧
<div style="position: relative;">
<img src="images/kofc.png" alt="Emergency Response Security Group">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
</div>
<br><br>
<button style="padding: 10px 20px; background-color: #FF00E1; color: white; border: none; border-radius: 5px;">Under Construction</button>
</div>
</div>
<center><p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p></center>
<img src="images/dragon.png">
<footer>
<center>
<font color="pink">=^..^= =^..^= Emergency Response Security Group</a> =^..^= =^..^=</font>
<br>
© 2025 + beyond!</center>
<br>
<center>
* <a href="privacy.html">Privacy Policy</a> * <a href="terms.html">TOS</a> * <a href="careers.html">Careers</a> * <a href="pricing.html">Pricing</a> * <a href="https://orcid.org/0000-0002-8846-4242">Research</a> * <a href="victimservices.html">Victim Services</a> *
</center>
<br>
</footer>
</body>
</html>