Profile avatar
pentestpartners.bsky.social
22 posts 113 followers 13 following
Regular Contributor

Last week Ken Munro and Matt Dowson were in Dublin, Ireland, for the IATA World Data Symposium. We presented a talk covering some of the significant legacy cybersecurity risks in aviation systems. #AviationCybersecurity #IATAWDS #LegacySystems #AviationSafety #CyberThreats

There are new mandatory United States Coast Guard cyber regulations for US flagged vessels and ports that come into effect on July 16. Be prepared. Full details and advice here: www.pentestpartners.com/security-blo... #USCG #cyberregulations #maritimesecurity #cybercompliance #cyberawareness

In our latest blog, David Lodge looks at the Rockchip boot process. He covers the boot order and how to force the MCU into low-level modes for direct USB access, as well as essential tools like xrock and rkflashtool: www.pentestpartners.com/security-blo...

Ken Munro recently presented at BCS The Chartered Institute of IT with an evening on hacking various transport systems, including planes, trains, automobiles, and ships…

In aviation, cybersecurity is not optional. The industry recognises that ensuring safety requires a consistent, standardised approach. Alex Lomas explains the process of conducting avionics penetration tests, looking at each stage in line with ED-203A: 👉 www.pentestpartners.com/security-blo...

We got curious about cheap, tiny phones promoted to children on social media, so we bought a few to see what’s inside... Read our blog on this here: www.pentestpartners.com/security-blo... #CyberSecurity #DigitalSafety

In 2016, the first strain of Mirai distributed DDoS attacks against Twitter, Facebook, and KrebsOnSecurity. Initially, it was misunderstood as an IoT botnet. However, our reverse engineering revealed that it targeted digital video recorder software from a single vendor: youtu.be/5gYN

We revisited wearable device forensics to show how someone could gain unauthorised access to a Garmin smartwatch and expose your data such as activity logs, GPS data, sleep patterns, and device information: www.pentestpartners.com/security-blo...

Maritime cybersecurity isn’t just for large fleets—small operators face risks too. Complying with security standards can feel daunting, but it’s important to protect your systems and data from attack. Read here: www.pentestpartners.com/security-blo...

How can we protect the integrity and confidentiality of the footage from body-worn cameras in law enforcement? Alex Lomas has outlined how encryption, integrity verification, and security measures can protect these devices so that the footage remains reliable www.pentestpartners.com/security-blo...

Our investigation back in 2018 revealed how a flaw in Swann's cameras exposed private video feeds! Sadly, we still find similar flaws in products today... www.youtube.com/watch?v=uZX9... #CyberSecurity #IoTSecurity #SmartHome #Privacy

We got curious about cheap, tiny phones promoted to children on social media, so we bought a few to see what’s inside. What did we find? Alarming security issues that parents need to know about: www.pentestpartners.com/security-blo... #CyberSecurity #CyberAwareness #GadgetSafety #TechNews

When the dust settles after a cyber breach, the spotlight is on tech fixes. But what about the other aspects that can make or break your recovery? These 10 actions go beyond tech fixes to protect your future resilience, reputation, and relationships. 👉 www.pentestpartners.com/security-blo...

CVRs are crucial for aviation safety, capturing cockpit audio for investigations.  But there's a twist... they have an erase button.   It sounds counterintuitive, right? But there's more to this... www.pentestpartners.com/security-blo...

Even DJs need downtime! 🎧 Throwback to summer when Don1 became El Hombre at The Fox for CHP & @pentestpartners.bsky.social . 🇪🇸✨ Spanish vibes, epic tunes, and good times. Turn it up, dream of 2025! 🪩❤️ #CyberHouseParty www.mixcloud.com/CyberHousePa... @don1.bsky.social

Wishing you and your loved ones a wonderful festive season from all of us at PTP. 🎄 A heartfelt thank you to our people, clients, partners, and followers for an incredible 2024. Here’s to a safe, joyful holiday season and a secure 2025! #TechUnderTheTree #MerryChristmas #HappyHolidays

Explore the challenges, regulations, and real-world lessons in IoT security through Ken Munro's talk at the PCI SSC Europe Community Meeting. Has IoT security truly improved? Watch now: www.youtube.com/watch?v=hae8... #IoTSecurity #CyberSecurity #PCI #IoTRegulations #CyberThreats #InfoSec

In our latest blog, "How easily access cards can be cloned and why your physical access control systems (PACS) might be vulnerable," Warren reveals how attackers exploit outdated configurations and default encryption keys to bypass these systems: www.pentestpartners.com/security-blo...

Your building's PACS can be vulnerable to card cloning. Our Warren recently shocked security professionals by cloning a badge in minutes, right before their eyes. His blog post covers five checks to help prevent cloning: www.pentestpartners.com/security-blo...

Secure boot ensures only authentic firmware can run on a device and should form part of a layered defence strategy. But is it enough to only have a secure boot on your main processor? What about sub-systems without secure boot capabilities? 🤔 www.pentestpartners.com/security-blo...

What would you do in a breach? 🚨   When attackers strike, technical defences aren’t all that matters. Non-technical preparations can make a big difference.   🔗 Read Luke Davis’s blog for six key steps you’ll wish you’d taken before a breach: www.pentestpartners.com/security-blo...

Phishing attacks are getting smarter, but that doesn’t mean you can’t stay one step ahead. In the final part of Rachel Rabin’s blog series, you’ll find practical advice on spotting and stopping email threats in Microsoft 365. Check it out here: www.pentestpartners.com/security-blo...

Our latest blog goes into the shocking £12 million rental scam featured on UNTOLD. We partnered with Channel 4 to uncover...🔎 Fake documents, stolen identities, and advanced social engineering - Read the full story: www.pentestpartners.com/security-blo...