资讯

Pen Test Partners recognises the need to protect end user privacy and security. We strongly believe in, and support, a coordinated and responsible approach to vulnerability disclosure. To this end, ...
If a third-party is breached corporate email address users are at risk. Email addresses are useful for all sorts of attacks that could be mounted against an organisation: Credential stuffing. This is ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
It’s every organisation’s worst nightmare: you find out you’ve been breached. Whether it’s ransomware locking you out, an unauthorised transfer of funds, or sensitive data leaving your network, what ...
Papa, the PTP Proactive Advanced Password Auditor, is a password cracking and auditing service. Attackers often exploit weak passwords and attempt to crack hashes to gain further access to a network, ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Data breaches make the headlines usually because of the sheer volume of data Research shows that often the volume of data is falsely inflated How forensics experts can spot it When a data breach hits ...
An Attack Surface Assessment (ASA) is an intentionally time constrained exercise that uses open-source information in a largely passive way to establish what services you are publishing to the ...
The threat landscape has never been more challenging. Significant numbers of highly skilled and motivated threat actors present a real danger. They have many potential goals such as penetrating your ...
From 1st August 2025, mandatory cybersecurity requirements come into effect under the EU’s Radio Equipment Directive (2014/53/EU), or RED. This also applies to the UK market, since RED was implemented ...