Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pentest People

Valentines Scams

It’s that time of year again where Cupid’s arrow strikes and love is in the air. Unfortunately, with love also comes a slew of scams. People trying to take advantage of your emotions and get money out of you. This Valentine’s Day, be aware of the different scams that may be targeting you. We’ll cover how to avoid fraud, catfishing and other techniques used by scammers this Valentine’s Day. Prefer a video over a good read?

The Kill Switch - A Look into a Hackers Methodology

We’re kicking off a new series of blogs featuring some of the best live and recorded content from our consultants with Alex’s ‘The Kill Switch’ talk as seen at the Future of Cybersecurity Event. Alex talks us through a hackers methodology. Focusing on threat sources, threat actors and how to analyse said threats. He then walks through the methodology known as ‘The Kill Chain’.

Sponsored Post

Under the Sheets, Practical Android Static Analysis

First off, before we get into the technical details of attacking applications, a few housekeeping bits must be understood. This blog is aimed at technical individuals that already understand at a basic level Android development and architecture, aiming to give security testers and application developers an insight into the ways an attacker may interrogate code to achieve some form of compromise.

Sponsored Post

The Battlefield vs Red Teaming - Where the Skills Collide!

It was early 2003 in central Iraq, a couple of hours before dawn, 30 degree heat, and everything had a green tint through the night vision goggles. I was on an operation with a team from the US Psychological Operations forces (psyops) and an ODA (Operational Detachment Alpha) from the US Special Forces. We'd spent days gathering HUMINT (Human Intelligence) and undertaking reconnaissance on the target. The ODA team was set up for the assault, the psyops were ready to run diversionary tactics and I was on the team providing comms and perimeter security. Authorisation was given from above, the operation began, and the sky lit up with tracer rounds.