TL;DR Chartership and professional titles UKCSC has announced that the CHECK Team Leaders and CHECK Team Members will be ...
A Hacker’s first Solo: the pitfalls of aviation connectivity EFBs sit in a bit of a no mans land of certification, variously ...
TL;DR Introduction   When it comes to being security aware, there are seemingly endless things you need to consider. Here are ...
TL;DR Introduction If you are a computer nerd, it’s statistically likely you’ll be self-hosting multiple kinds of web ...
Tl;DR Introduction In my previous job as the SOC manager for a public sector organisation, I would often see attempts from ...
Unit 2, Verney Junction Business Park, ...
Discord has become an attractive tool for attackers not because it’s malicious, but because it’s legitimate and trusted. It often flies under the radar of security controls and offers features that ...
Use Linux and a Bluetooth adapter card—this could be a built-in or cheap USB dongle. It’s probably FREE to most practicing hackers. Remember that Raspberry Pi 3 (or newer) sitting in your drawer?
On a Red Team engagement we entered a busy multicloud estate. AWS, GCP and Azure were all used, with Terraform Cloud orchestrating every change. That brings speed and consistency, but it also ...
We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The attacker delivered an attack that combined remote code execution, persistence, tunnelling, and a ...
Available in black, with an embroidered logo, they say “I’ve got black socks with the Pen Test Partners logo embroidered on them”, they say “I’ve got an extra pair of socks”, they say “with these ...