This is the last of a three-part series (part one here, part two here) looking at effective investigation, response, and remediation to email threats in M365, with the final blog focussed on native ...
Be aware of some common approaches that are prevalent in scams such as these.
I’m often asked why anyone would attempt to hack shipping. Simple: money. Cybercriminals exploit vulnerabilities in port systems and shipping networks for high-stakes rewards, often bypassing ...
This is the second in a three-part series looking at the key steps for an effective investigation, response, and remediation of email-based threat in M365. Part one looked at the key artefacts to ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...
Default iOS configuration leaves your locked device vulnerable Ensure your emergency contacts are set. Use ‘FindMy’ to track / wipe lost devices. Take regular backups. Consider turning off the lock ...
Maritime cyber insurance has been playing catch-up with maritime cyber security for a while now. It was all pretty good until the availability of cheap VSAT meant that ships became constantly ...
Testing a ship’s cybersecurity, is a complex process aimed at ensuring the vessel’s safety, security, and operational readiness. Both new-build vessels and existing ships must comply with maritime ...