BEC attacks typically leverage the compromise of a trusted third party to conduct a phishing attack against a partner ...
Be aware of some common approaches that are prevalent in scams such as these.
This is the second in a three-part series looking at the key steps for an effective investigation, response, and remediation of email-based threat in M365. Part one looked at the key artefacts to ...
Testing a ship’s cybersecurity, is a complex process aimed at ensuring the vessel’s safety, security, and operational readiness. Both new-build vessels and existing ships must comply with maritime ...
Maritime cyber insurance has been playing catch-up with maritime cyber security for a while now. It was all pretty good until the availability of cheap VSAT meant that ships became constantly ...
Default iOS configuration leaves your locked device vulnerable Ensure your emergency contacts are set. Use ‘FindMy’ to track / wipe lost devices. Take regular backups. Consider turning off the lock ...
CCTV is often overlooked; ‘shadow tech’ whose security isn’t as carefully reviewed as core IT assets It is often a responsibility for facilities managers who may have little experience of cyber ...
I’m often asked why anyone would attempt to hack shipping. Simple: money. Cybercriminals exploit vulnerabilities in port systems and shipping networks for high-stakes rewards, often bypassing ...
In my last blog post we delved into the Volatility Framework. In this two-part series I want to highlight how memory forensics plays a crucial role in enhancing forensic investigations by providing ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...