Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pentest People

Sponsored Post

What is Penetration Testing?

A Penetration Test commonly consists of assessing; the confidentiality, integrity and availability of an information system, widely known as the CIA triad. There are numerous penetration testing approaches. This can include black-box testing, white-box testing and grey-box testing which all, in turn, provide remediation advice. However, the three types of testing define different approaches the consultant takes during an assessment and all have different benefits and disadvantages.

My Journey As A Woman In Cyber Security

Cybersecurity is a very unique and niche career however, with this is the shortfall of skilled workers. In comparison to other roles, cybersecurity sees one of the largest gaps in its qualified workers; in 2021, it was estimated that there was a shortfall of around 3.5 million people. Cybersecurity also sees one of the biggest discrepancies in the female to male ratio in the workplace. In 2013, it was estimated that women in cyber security represent around 10% of the global cybersecurity workforce.

Cornwall Council Warns of Covid Scam Text Messages

Cornwall Council is warning residents about a new scam that is making the rounds on text messages. Fraudsters are sending scam messages that appear to be from the Cornwall Council, telling people that they need to isolate themselves due to being in contact with those with COVID19. They are being asked to click on a link for more information and to book a test. The text is being sent from mobile phone numbers, so it’s important to be wary of any links you receive from unknown senders.

The Foreign Office Hack

The UK’s Foreign Commonwealth and Development office (FCDO) was the target of a “serious cyber security incident”, it has emerged. The BBC understands unidentified hackers got inside the FCDO systems but were detected. This is just the latest in a spate of attacks on government departments in what seems to be an attempt to gain access to sensitive information.

Apple Cyber Attacks: Mobile Devices Still at Risk

Apple iPhone users are one of the largest targets when it comes to cyber-attacks. Apple uncovered its biggest hack in history last November, which went undetected for five years. At the time they alerted users who had fallen victim to the colossal Apple cyber attack. The hack targeted Apple’s iCloud service and was able to gain access to users’ photos, videos, and other personal information.

Sponsored Post

European Oil Hacks

Last week saw the European ports were hit by a cyberattack, authorities disclosed that this was a targeted attack against Belgium, Germany, and the Netherlands. These threat actors have hit multiple oil facilities in Belgium's ports, including Antwerp, which is the second biggest port in Europe after Rotterdam. Among the impacted port infrastructure, there is the Amsterdam-Rotterdam-Antwerp oil trading hub, along with the SEA-Tank Terminal in Antwerp.