Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pentest People

Police Arrest LabHost Cybercrime Gang

It’s been reported that police have apprehended 37 individuals globally, alleged to have used a technology platform facilitating fraudulent activity through deceptive text messages aimed at defrauding unsuspecting victims. Law enforcement agencies focused their efforts on dismantling the operations of LabHost, the platform used by criminals to send these messages and lure victims to fake websites masquerading as legitimate online payment or shopping services.

Roku Makes 2FA Mandatory for all After Nearly 600K Accounts Pwned

After attackers accessed around 591,000 customer accounts this year, Roku is making 2FA mandatory. Over two separate incidents, the first affecting 15,363 accounts and the second affecting roughly 576,000. In these cases, the attackers used the accounts to purchase streaming subscriptions and hardware stored in users accounts, the company has confirmed.

What is Incident Response?

Incident response is a crucial aspect of cybersecurity that involves identifying, containment, eradicating, and recovering from security incidents. It is designed to minimise the impact of security breaches, protect sensitive data, and restore normal operations as quickly as possible. To facilitate a smooth incident response, organisations should create a comprehensive checklist that outlines the necessary steps, resources, and communication channels.

Pentest People Announces its Assured Service Provider Status for NCSC's Cyber Incident Exercising Scheme

Pentest People are so proud to announce we have become one of the only few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre (NCSC) Cyber Incident Exercising (CIE) scheme.

Cyber Essentials Overview

Cyber Essentials is a certification scheme developed by the National Cyber Security Centre (NCSC) in the United Kingdom. This scheme aims to help organisations establish a baseline of cyber security controls to protect against common cyber attacks. Two levels of certification are offered under the Cyber Essentials scheme: Cyber Essentials and Cyber Essentials Plus.

IoT Penetration Testing: How to Perform Pentesting on a Connected Device

IoT pentesting, also known as IoT penetration testing, is a process of assessing the security vulnerabilities of IoT devices and networks. The purpose of IoT pentesting is to identify weaknesses in the system that could be exploited by attackers and to suggest remediation measures to enhance the overall security of the IoT infrastructure. The process of conducting a successful IoT penetration test involves several steps.

The 5 Phases of Penetration Testing

Penetration testing, also known as pen testing, is a method of evaluating the security of computer systems and networks by simulating an attack. It helps identify vulnerabilities and security flaws to mitigate potential risks. The article "Learn About the Five Penetration Testing Phases" discusses the five phases involved in a penetration testing process.

The Benefits of Cyber Security and AI

Artificial intelligence (AI) has revolutionised the field of cyber security, offering unparalleled advantages in detecting and preventing sophisticated cyber threats. From detecting anomalies in network behaviour to automating threat response, AI has become an indispensable tool for organisations looking to strengthen their defence against cyber-attacks.

Key Reasons Why Penetration Testing For Mobile Apps is Crucial for Enterprises

Mobile applications, commonly referred to as mobile apps, are software programs designed to run on mobile devices such as smartphones and tablets. These apps can provide users with a wide range of functionalities, from social networking and entertainment to productivity and e-commerce. With the rapid growth of mobile technology in recent years, businesses have increasingly turned to mobile apps as a way to connect with their customers and streamline their operations.