Imposter syndrome in cyber security
Pen Test Partners | Penetration Testing & Cyber Security
by Sam Macdonald
2d ago
TL;DR Imposter syndrome is the belief that you are undeserving of your achievements Anyone can be affected by it There are ways to cope What is imposter syndrome? Imposter syndrome […] The post Imposter syndrome in cyber security first appeared on Pen Test Partners ..read more
Visit website
How to handle vulnerability reports in aviation
Pen Test Partners | Penetration Testing & Cyber Security
by PTP Aviation Team
2d ago
TL;DR Always thank researchers for reporting vulnerabilities. Acknowledging their efforts can set the right tone. Lead all communications with researchers. Don’t let legal or PR teams take over. Provide regular […] The post How to handle vulnerability reports in aviation first appeared on Pen Test Partners ..read more
Visit website
Airbus Navblue Flysmart LPC-NG issues
Pen Test Partners | Penetration Testing & Cyber Security
by PTP Aviation Team
1w ago
LPC-NG or Less Paper Cockpit – Next Generation is an electronic flight bag (EFB) application offered by Navblue, a part of Airbus. It’s used for calculating engine thrust requirements (perf) on […] The post Airbus Navblue Flysmart LPC-NG issues first appeared on Pen Test Partners ..read more
Visit website
How can you protect your data, privacy, and finances if your phone gets lost or stolen?
Pen Test Partners | Penetration Testing & Cyber Security
by Lambros Zannettos
1w ago
Steps to take when your device is lost or stolen TL;DR This is a guide to help prepare for a situation where your mobile device is lost or stolen, including […] The post How can you protect your data, privacy, and finances if your phone gets lost or stolen? first appeared on Pen Test Partners ..read more
Visit website
Direct Memory Access (DMA) attacks. Risks, techniques, and mitigations in hardware hacking
Pen Test Partners | Penetration Testing & Cyber Security
by Rachel Rabin
2w ago
TL;DR Direct Memory Access (DMA) attacks are a powerful class of attack that give read and write access to the memory of a target system, bypassing the main CPU to […] The post Direct Memory Access (DMA) attacks. Risks, techniques, and mitigations in hardware hacking first appeared on Pen Test Partners ..read more
Visit website
Proroute H685 4G router vulnerabilities
Pen Test Partners | Penetration Testing & Cyber Security
by Joe Lovett
3w ago
TL;DR Two vulnerabilities on the Proroute H685t-w 4G Router Authenticated command injection is possible through the admin interface Reflected Cross Site-Scripting is possible through the admin interface Patch any routers […] The post Proroute H685 4G router vulnerabilities first appeared on Pen Test Partners ..read more
Visit website
Cyber threats to shipping explained
Pen Test Partners | Penetration Testing & Cyber Security
by Andrew Tierney
3w ago
TL;DR Modern vessels are becoming increasingly connected. While it is unlikely that hackers could fully control a container ship remotely, they may be able to disrupt systems such as the […] The post Cyber threats to shipping explained first appeared on Pen Test Partners ..read more
Visit website
Living off the land, GPO style
Pen Test Partners | Penetration Testing & Cyber Security
by Ceri Coburn
1M ago
TL;DR The ability to edit  Group Policy Object (GPOs) from non-domain joined computers using the native Group Policy editor has been on my list for a long time.  This blog […] The post Living off the land, GPO style first appeared on Pen Test Partners ..read more
Visit website
Smart home security advice. Ring, SimpliSafe, Swann, and Yale
Pen Test Partners | Penetration Testing & Cyber Security
by Adam Bromiley
1M ago
Introduction This guide covers the security of smart home security products from Ring, Yale, Swann, and SimpliSafe. Whether you’re looking to monitor your property remotely, enhance your home’s security, or […] The post Smart home security advice. Ring, SimpliSafe, Swann, and Yale first appeared on Pen Test Partners ..read more
Visit website
Advanced forensic techniques for recovering hidden data in wearable devices
Pen Test Partners | Penetration Testing & Cyber Security
by Joseph Williams
1M ago
TL;DR  A walk-through of forensic data recovery  Detailed example of how to retrieve potentially sensitive deleted data  Includes location, sleep and activity tracking  Understand the security and privacy implications of […] The post Advanced forensic techniques for recovering hidden data in wearable devices first appeared on Pen Test Partners ..read more
Visit website

Follow Pen Test Partners | Penetration Testing & Cyber Security on FeedSpot

Continue with Google
Continue with Apple
OR