Modern vessels are becoming increasingly connected. While it is unlikely that hackers could fully control a container ship ...
Two vulnerabilities on the Proroute H685t-w 4G Router Authenticated command injection is possible through the admin interface Reflected Cross Site-Scripting is possible through the admin interface ...
Swann is a home security company that provides a range of products including CCTV cameras, video doorbells, and alarms. A ...
The ability to edit Group Policy Object (GPOs) from non-domain joined computers using the native Group Policy editor has been on my list for a long time. This blog post takes a deep dive into what ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Pen Test Partners provides CBEST Red Teaming to assess the Prevention, Detection, and Response capabilities of financial institutions. It means that those institutions maintain resilience and are able ...
Rooting is useful for Android assessments The process is relatively simple It will wipe all user data from the device and void any warranty For mobile testing, be it for apps or hardware, having ...
There are lots of guides online about how to set good passwords, however, fundamentally the best advise is to use a password manager, such as Bitwarden, 1Password, KeePass among others. These systems ...