News

When we planned PTP Cyber Fest, we set out to create something different from the usual cybersecurity events.  After two busy days, we can proudly say the event delivered exactly what we hoped for and ...
Enhance your organisation's password security with Pen Test Partners' PAPA service. Identify weak credentials by securely ...
Practice being punched in the face. The realities of incident response preparation “Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the ...
Assess your organisation's physical security with Pen Test Partners' covert and overt testing services. Our experts simulate real-world intrusion attempts to identify vulnerabilities, test staff ...
Integrate security into every phase of your software development lifecycle with Pen Test Partners' Secure SDLC services. Our experts help you embed robust security controls from design to deployment, ...
All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. Cruise ships are possibly the most complex collection of systems that you’ll find in one physical, moving ...
When we carry out security assessments in Operational Technology (OT) and Industrial Control System (ICS) environments, one thing that often stands out is the use of dual-homed devices. In this blog ...
As Red Teamers, we often find information in SharePoint that can be useful for us in later attacks. As part of this we regularly want to download copies of the file, or parts of their contents. In ...
In certain circumstances it can be challenging installing client applications for testing. Situations arise where the application could be provided unsigned or requires self-signing. As a result, the ...
Identify vulnerabilities, simulate real-world attacks, and verify the effectiveness of your defences. See how well your physical security stands up to social engineering and ethical intrusions by ...
Over the years we have been fortunate to have been called upon to help with some challenging investigations. iPhone prize scams, ransomware attacks that weren’t, aiding the Steele Dossier case, and ...