Two vulnerabilities on the Proroute H685t-w 4G Router Authenticated command injection is possible through the admin interface Reflected Cross Site-Scripting is possible through the admin interface ...
Modern vessels are becoming increasingly connected. While it is unlikely that hackers could fully control a container ship ...
Swann is a home security company that provides a range of products including CCTV cameras, video doorbells, and alarms. A ...
The ability to edit Group Policy Object (GPOs) from non-domain joined computers using the native Group Policy editor has been on my list for a long time. This blog post takes a deep dive into what ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
An Attack Surface Assessment (ASA) is an intentionally time constrained exercise that uses open-source information in a largely passive way to establish what services you are publishing to the ...
CREST has worked with OWASP to create a quality assurance standard for web security. The CREST OWASP Verification Standard (OVS) Program is aligned with OWASP’s application security standard. It is ...
Pen Test Partners provides CBEST Red Teaming to assess the Prevention, Detection, and Response capabilities of financial institutions. It means that those institutions maintain resilience and are able ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
As security is a process not a product, security training should never be commoditised. That’s why we deliver bespoke security training to all levels, from absolute novice users through to CISOs, ...