Bulletin № 001/First issue · 07.05.2026/Lat 40°42'N · Lon 74°00'W

Weatherthestorm.

Ororo is a security operations group built for the worst day. We help organizations prepare for, respond to, and recover from intrusions, ransomware, and the long-tail incidents nobody saw coming.

PracticeDFIR · IR · Hunt · Research
PostureON CALL
ReachRemote · onsite
StatusAccepting retainers
Threat LevelELEVATED
Active Fronts4
Response Time< 2h
PostureON CALL
Coverage24 / 7 / 365
ReachRemote · Onsite
RetainersOpen
ResearchActive
Threat LevelELEVATED
Active Fronts4
Response Time< 2h
PostureON CALL
Coverage24 / 7 / 365
ReachRemote · Onsite
RetainersOpen
ResearchActive
§ 01Operating Fronts

Four practices.
One operations floor.

Each front is staffed by senior operators with decades of combined time on the keyboard — under one roof, on one bridge, working the same incident.

01 / 04
COLD FRONT
Forensics

Endpoint, cloud, and identity forensics for the most complex breaches and intrusions. Full chain of custody, court-ready output, and zero-handwave methodology.

Brief 01
02 / 04
WARM FRONT
Incident Response

A retained, on-call IR team available around the clock. Tabletop programs to rehearse the worst day before it arrives, and field commanders to lead it when it does.

Brief 02
03 / 04
OCCLUDED FRONT
Threat Hunting

Hypothesis-driven hunts across endpoint, network, and identity. We surface the adversaries that operate below your alert thresholds — and write the detections so they can't again.

Brief 03
04 / 04
STATIONARY FRONT
Research

Original vulnerability research, malware reverse engineering, and threat actor profiling. Published openly so the wider defender community can move faster.

Brief 04
§ 02Engagement

Four ways to work together.

Whether the storm is on the horizon or already on the floor — there's a way to bring us in. We size the engagement to the moment.

Retainer
Always on call
A standing relationship with named operators on your account, an IR plan ready to execute, and a channel that's already open when you need it.
Incident
Active response
Mid-breach. Open a channel and reach a senior responder — no qualification call, no sales desk. We're on the bridge with you the same day.
Readiness
Before the storm
Tabletop exercises, IR plan stress-tests, posture reviews. We rehearse the worst day so the real one is one you've already worked through.
Research
Bespoke depth
Targeted threat hunts, malware reverse engineering, and original research scoped to a question your team needs answered with rigor.
§ 03Doctrine

Four words we work by.

The voice of every engagement. Every report. Every escalation at 3am.

i.
Confident.

We've seen this before — and the version of it nobody's seen yet. Decades on the keyboard before we touched yours.

ii.
Calm.

The bridge stays quiet because the work is loud. Steady hands, clear voices, no theatre.

iii.
Precise.

Court-ready forensics. Audit-ready reports. Detection rules that catch what we caught — and don't trip on what isn't a threat.

iv.
Relentless.

We don't stop at containment. We don't stop at recovery. We stop when you're more resilient than before.

§ 04Field Dispatches

Lessons from the front.

Threat reports, advisories, detection rules, and field notes — published openly because the community is stronger when defenders share faster than adversaries do. The first dispatch is in the field.

Forthcoming · First dispatch

Subscribe to the dispatch.
Be on the list when the first one ships.

Original research, advisories, and field notes from our operators — sent the moment they're published, no marketing chaff. We'd rather you read the work than the wrapper.

One email per dispatchUnsubscribe in one click
§ 05Open a channel

Pressure's dropping.
Talk to a responder.

You'll reach a senior operator — not a sales desk, not a qualification call. An experienced responder on the line, ready to triage what you're facing.