Memory forensics enhances investigations by analysing volatile data (in RAM) unavailable in disk forensics. Key insights from ...
An unauthenticated local file inclusion vulnerability is present within the nginx docker container which could allow the download of the device’s MQTT certificates ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...
We’ve seen an increase in multi-stage Adversary in the Middle (AiTM) phishing BEC in M365. These usually originate from a compromised trusted party, and lead to a series of AiTM attacks and follow-on ...
Direct Memory Access (DMA) attacks are a powerful class of attack that give read and write access to the memory of a target system, bypassing the main CPU to gain kernel privileges. We became ...
LPC-NG or Less Paper Cockpit – Next Generation is an electronic flight bag (EFB) application offered by Navblue, a part of Airbus. It’s used for calculating engine thrust requirements (perf) on ...
Imposter syndrome is the belief that you are undeserving of your achievements Anyone can be affected by it There are ways to cope Imposter syndrome is the psychological pattern in which a person ...
This is a guide to help prepare for a situation where your mobile device is lost or stolen, including where it is stolen in an unlocked state. The post covers: Creating good habits in your digital ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
An Attack Surface Assessment (ASA) is an intentionally time constrained exercise that uses open-source information in a largely passive way to establish what services you are publishing to the ...