On 15th April we were delighted to attend the Digital City Awards online ceremony where we scooped two wins, the Cyber Security Project of the Year and the major award category, The Digital City Innovation of the Year Award. This award recognises the novel product or service which has revolutionised the way things are done and made a real difference in its intended field.Find Out More
Author: Lewis Fairburn
Lewis is the Marketing Manager here at Pentest People. Handling our brand identity, event planning and all promotional aspects of the business.
Pentest People Achieve place on G-Cloud 12 Framework Pentest People are happy to announce achieving a place on the G-Cloud 12 Framework within the Government Digital Marketplace. The position further proves our rapid growth and quality of our Penetration Testing Services. Along with our ever focused innovations within the industry, now applying our extensive experience […]Find Out More
Working From Home isn’t something we’re all used too. There’s new security issues that come to light during remote working. This week we’ll talk through the major issues faced with home working and how to be vigilant against cybercriminal activity.Find Out More
Amazon S3 is a great, cheap and flexible option when it comes to sharing and hosting files. However what is not great is that any file can be uploaded to a S3 bucket. And by any file we mean any file including malicious files. It is very common for people not to check the files that are uploaded to S3. But it is possible to virus scan files uploaded to S3. it just takes a little bit of work.Find Out More
Pentest People named as Supplier on Crown Commercial Services Framework This week saw Pentest People named as a supplier on the Crown Commercial Services (CCS) Framework. Allowing public sectors to find qualified cyber security companies like ourselves to perform work on sensitive systems. ‘Crown Commercial Service supports the public sector to achieve maximum commercial value […]Find Out More
In our third part of our SQL Series we look at how to guard against a lesser known but just as serious vulnerability, Second Order Injection.Find Out More