Skip to main content
Monitoring
CyberBullet logo
  • Home
  • Capabilities

    Manual-first testing and governance work — choose a discipline or browse the full catalog.

    • External Network Pentest Internet-facing penetration testing — we attack your perimeter the way real threat actors do. Find what's exposed before they do.
    • Internal Network Pentest Manual internal network penetration testing that simulates a breached attacker — finding the lateral-movement paths your scanners miss.
    • Web & Mobile App Pentest Manual application penetration testing — we find the business-logic flaws and authentication bypasses scanners can't see in your web and mobile apps.
    • Wireless Pentest Manual wireless penetration testing — we find rogue APs, weak encryption, and the Wi-Fi attack paths that turn an attacker in your parking lot into a network insider.
    • Network Segmentation Test Validate your network segmentation works the way you think it does. We test the boundaries between zones, VLANs, and trust domains the way an attacker would.
    • Phishing & SE Testing Realistic phishing and social engineering campaigns that measure your real human attack surface — and the training that actually moves the needle.
    All services →
  • Methodology
  • Industries
  • The CyberBulletin
  • About
Book assessment
  • Home
  • Services
    • All services
    • External Network Pentest
    • Internal Network Pentest
    • Web & Mobile App Pentest
    • Wireless Pentest
    • Network Segmentation Test
    • Phishing & SE Testing
    • Vulnerability Assessment
    • Framework & Gap Assessment
    • Risk Assessment
    • Web Application Testing
    • Regulatory & Compliance
    • Ongoing Support
    • Virtual CISO
    • Outsourcing
    • Cybersecurity Governance
    • InfoSec Policy & Procedures
  • Methodology
  • Industries
  • The CyberBulletin
  • About
Book assessment

Legal

Privacy Policy

Last updated: September 5, 2023

This privacy notice for CyberBullet LLC ("we," "us," or "our") describes how and why we might collect, store, use, and/or share ("process") your information when you use our services ("Services"), such as when you visit our website at cybullet.com or engage with us in other related ways, including any sales, marketing, or events.

Reading this privacy notice will help you understand your privacy rights and choices. If you do not agree with our policies and practices, please do not use our Services. If you have any questions or concerns, please contact us at hello@cybullet.com.

Summary of Key Points

This summary provides key points from our privacy notice. More detail on each topic is available in the full sections below.

What personal information do we process?

When you visit, use, or navigate our Services, we may process personal information depending on how you interact with us, the choices you make, and the products and features you use. This typically includes contact information (name, email, company) you voluntarily provide through forms or scheduling tools, plus standard server logs (IP, user agent, referrer) collected automatically.

Do we process any sensitive personal information?

We do not knowingly process sensitive personal information (e.g., race, religion, health information, biometric data) through our public website.

Do we receive any information from third parties?

We do not receive personal information from third parties.

How do we process your information?

We process your information to provide, improve, and administer our Services, communicate with you about your inquiries, prevent fraud, and comply with law. We process personal information only when we have a valid legal reason to do so.

In what situations and with which parties do we share information?

We may share information in specific situations and with specific third parties — for example, with service providers who help us operate the website (analytics, calendar booking, email delivery) under data processing agreements that bind them to confidentiality.

How do we keep your information safe?

We have organizational and technical processes and procedures in place to protect your personal information. However, no electronic transmission over the internet or information storage technology can be guaranteed to be 100% secure.

What are your rights?

Depending on where you are geographically located, applicable privacy law may grant you rights regarding your personal information. These can include the right to access, correct, delete, or restrict the processing of your data.

How do you exercise your rights?

The easiest way to exercise your rights is by contacting us at hello@cybullet.com. We will consider and act upon any request in accordance with applicable data protection laws.

Changes to this Notice

We may update this privacy notice from time to time. The updated version will be indicated by an updated "Last updated" date.

Contact Us

If you have questions or comments about this notice, you may email us at hello@cybullet.com.

Note: This is a condensed plain-language version of the original cybullet.com privacy notice. Replace with the full legal text reviewed by your counsel before launch.

CyberBullet logo

Security · Advisory · Compliance

Manual-first offensive security and governance for organizations that take their posture seriously.

OSCP OSWE CISSP GPEN CEH

Services

  • Penetration Testing
  • Cybersecurity Assessments
  • Advisory & vCISO
  • Governance & Compliance
  • Phishing & Social Engineering

Company

  • About
  • The CyberBulletin
  • FAQ
  • Contact

Legal

  • Privacy Policy
  • Terms & Conditions

Stay Sharp

A monthly briefing of the threats, regulations, and findings that actually matter. No fluff. Unsubscribe anytime.

Status Operational Last assessment Active SOC 2 In Progress Response time < 24h —

© 2026 CyberBullet. All rights reserved.

  • Privacy
  • Terms