Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

SecurePortal 2.10 - Introducing Threat Intelligence

At Pentest People, we understand that threats extend beyond your infrastructure to global events and industry-specific challenges that can impact your organisation. That's why we're excited to unveil our new Threat Intelligence Dashboard, a powerful tool that provides in-depth insights into global threats relevant to your industry and sector. Enhance your situational awareness and empower your team with actionable intelligence tailored to your specific needs.

Okta vulnerability explained (bcrypt auth bypass)

Okta Bcrypt Authentication Bypass Explained Last week, on October 30th, Okta released an interesting security advisory detailing a vulnerability that could potentially lead to an authentication bypass. According to Okta, the vulnerability was discovered during an internal review and was promptly addressed. Okta was transparent about the issue, sharing the details publicly.

Delete Registry Keys Using PowerShell

In Windows system administration, one of the more advanced yet important tasks that can be accomplished using PowerShell is deleting registry keys and values. This operation requires careful handling to avoid unintended consequences. Registry keys and values in Windows are critical components that store configuration settings for the operating system and installed applications. Modifying the registry can lead to system instability or even failure if not done correctly.

API Security: The Non-Negotiable for Modern Transportation

The transportation sector is undergoing a digital revolution, from railways to aviation and trucking. APIs are at the heart of this transformation, particularly for airlines. Airlines utilize APIs to integrate internal systems with vital services such as booking platforms, check-in services, real-time flight updates, communication with customs agencies, and baggage handling.

Adding runtime threat detection to Google Kubernetes Engine with Falco

One of the big advantages of running your workloads on a managed Kubernetes service like Google Kubernetes Engine (GKE) is that Google ensures your clusters are being deployed and managed following industry best practices. While GKE clusters are incredibly secure and reliable, there is always room for improvement. In this blog, we’re going to describe how you can enhance GKE’s already great security by adding runtime threat detection with Falco.

Trustwave Strengthens Partnership with Microsoft to Enhance Cybersecurity in APAC

Trustwave has further solidified its partnership with Microsoft by achieving Microsoft FastTrack Ready partner status for Microsoft 365 and being named a Microsoft Verified Managed Extended Detection and Response (MXDR) solution provider for the Asia Pacific (APAC) region. This recognition underscores Trustwave's commitment to empowering organizations across Australia and the wider APAC region with advanced cybersecurity solutions.

How to Apply the NIST Framework to Your Mobile Security Strategy

If mobile devices aren’t a high priority in your security posture, they should be. About two-thirds of employers consider smartphones “critical to agility and speed of decision-making,” and some would even consider phasing out PCs entirely. As a starting point, consider using the National Institute of Standards and Technology (NIST) cybersecurity framework. This set of guidelines from the U.S.

CMMC 2.0 Explained: What You Must Know For 2025

With the final CMMC rule published, here’s a summary of everything you need to know for your CMMC Level and when. Another step closer. After more than seven years in the making, the US Department of Defense (DoD) finalized a rule establishing the Cybersecurity Maturity Model Certification (CMMC) program and outlining how it will work. The final program rule was published in the Federal Register on 15 October and will go into effect on 16 December.

The Role of Secure Shipping in Protecting High-Value Goods

Transporting high-value goods, whether it be jewelry, electronics, artwork, or luxury items, requires an enhanced level of care and attention. The process of shipping these valuable items comes with inherent risks, such as theft, damage, or loss during transit. This is where secure shipping plays a vital role in ensuring that high-value goods are transported safely and arrive at their destination without incident. Implementing robust security measures throughout the shipping process is crucial for minimizing risk and maintaining the integrity of high-value shipments.

Microsoft Word's recent glitch deleted documents when saving them

Have your users spent hours working on a document in Microsoft Word, only to have it disappear when they try to save it? A recent bug in Microsoft Word, highlighted by Bleeping Computer, caused Word documents to be deleted instead of saved, leaving users frustrated. For IT administrators, it is vital to address these issues and educate users within the organization about best practices to reduce data loss and ensure business continuity.