Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pentest People Named in The Sunday Times 100

This year continues to be one of great milestones for Pentest People as we’ve been named as one of Britain’s fastest-growing private companies by The Sunday Times 100, ranking 87. The inclusion recognises our significant achievements during a challenging time for businesses in the UK. Our ranking reflects the had work the team has put to get the company where it is today to achieve annual sales growth of 55.42% over three years, to £7.2m.

Cloud Testing Challenges

Cloud testing is the process of validating applications, services, and databases that are hosted on cloud platforms. It involves verifying configurations, scalability, workloads, security controls, etc., to ensure that they perform as expected under different conditions. Cloud testing also provides a platform for performance testing and load testing before and during production in order to monitor any changes made to the system.

British Airways, Boots & The BBC Cyber Attack 2023

Last week the British Airways, Boots and the BBC all suffered cyber attacks of varying levels. The three businesses have been hit with an ultimatum to begin ransom negotiations from a cybercrime group after employees personal data was stolen in a hacking attack. It emerged on Wednesday the gang behind a piece of ransomware known as Clop had posted it onto their dark net site.

Cloud Security Assessment

Cloud security is the practice of protecting data, applications, and infrastructure that reside on cloud computing platforms. This includes Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and other public and private cloud services. It involves implementing security protocols such as encryption, authentication methods, firewalls and access control to help protect the data and applications that are hosted on cloud servers.

The Importance and Benefits of Incident Response

An Incident Response Plan prepares a business for responding to a security breach or cyber-attack. An Incident Response Plan outlines the steps an organisation should take when they discover a potential cyber-attack, allowing them to quickly identify, contain, and remediate threats. It’s also essential for organisations to have processes in place when reporting a cyber attack.

Cyber Security Surrounding Social Media

Social media platforms have become primary forms of communication in today’s digital world. This technology has allowed us to virtually connect with friends, family and colleagues from all over the globe. Still, it has opened up new avenues for cybercriminals to exploit users’ data. The risk of digital identity theft, financial fraud and other malicious activities increases with the use of social media.

Vulnerability Highlight: WordPress Error-Based Information & Exposure

By default, the WordPress administrative login page displays a helpful error message whenever an account user types in the wrong username/email address or password. Unfortunately, these same helpful error messages can also be abused to assist a threat actor to validate account usernames/email addresses and/or passwords. An incorrect username/password guess combination generates the following error message: “The username ‘name-entered’ is not registered on this site”.