Pentest People
Blogs

View All

Most Recent Blogs

Welcome to our Cyber Security blog collection, where you'll find a wealth of knowledge and insights on the latest trends, best practices, and emerging threats in the world of digital protection. Our expert writers cover a wide range of topics, from essential security tips for individuals and businesses to in-depth analysis of recent cyber attacks and data breaches. Stay informed, safeguard your digital assets, and enhance your security posture by exploring our constantly updated selection of articles designed to keep you ahead in the ever-evolving landscape of cyber security.

5 Penetration Testing Standards You Should Know

This blog covers the 5 Penetration Testing Standards you should know and why they are so important for businesses to know.

The Importance Of Firewall Penetration Testing In Your Security Strategy

This blog explains the importance of Firewall Penetration Testing in your security strategy and how this combats the risks of cyber threats by identifying weaknesses in their firewalls before malicious actors can gain access.

So We Tried the Wim Hof Method: Here’s What Happened

Here at Pentest People, we always value our staff's mental well-being and invest in our employees at work as well as outside of work. Our CEO, Andrew, encouraged us all to take part in this trip in 2022, from his personal experience with the Wim Hof course and for us all to share this new method as a team.

5 Best Web Application Penetration Testing Tools Of 2023

This blog covers what a Web Application is and the 5 best Web Application Penetration Testing Tools of 2023. Have a read to find out more about this topic.

Ransomware Series

Explore our Ransomware blog collection, featuring expert insights on the latest trends, prevention strategies, and real-life incidents. Stay informed, protect your digital assets, and enhance your resilience against ransomware with our regularly updated articles in this crucial area of cyber security.

Hive Ransomware Group – Brought to Justice

This blog covers the Hive Ransomware Group recently been brought to justice after a collaborative investigation including how big the impact was and what the current situation is.

Royal Mail Ransomware Attack – Part 2

This blog covers the Royal Mail ransomware attack part 2 - following on from part 1, a more in depth and technical approach to the attack.

Ransomware Hits Royal Mail – Lets Recap

Royal Mail has been hit by a Ransomware Attack, alongside the Guardian Newspaper, in the same week. This blog post covers what ransomware is and what we've learnt from this huge scale attack on these two huge organisations.

The Threat of Ransomware to Businesses

This blog talks about the threat of Ransomware to businesses and the risks businesses can face from these types of attacks including real world examples of Ransomware attacks and the cost of this attacks in the aftermath.

Cyber News Series

Dive into our Cyber News blog collection, where you'll find the latest stories and updates from the ever-evolving world of cyber security. Our curated articles cover recent incidents, emerging trends, and impactful news, keeping you informed and prepared to navigate the dynamic digital landscape. Stay up-to-date with our frequently refreshed content that brings the most relevant cyber stories right to you.

So We Tried the Wim Hof Method: Here’s What Happened

Here at Pentest People, we always value our staff's mental well-being and invest in our employees at work as well as outside of work. Our CEO, Andrew, encouraged us all to take part in this trip in 2022, from his personal experience with the Wim Hof course and for us all to share this new method as a team.

Pentest People Achieves The 'We Invest in People' Accreditation!

This blog covers our achievement of The Investors in People Accreditation and what this means to us as a business. The accreditation recognises our continued work in the development and support of our team based in the company’s Leeds and Cheltenham offices.

Twitter Hack: Joseph O'Connor Jailed for Celebrity Cyber Attack

This blog covers the recent twitter hack and the consequences of this attack: what damage was caused and what this means for the future of cyber security for celebrities.

British Airways, Boots & The BBC Cyber Attack 2023

This blog covers the most recent attack on British Airways, Boots and the BBC and how all three organisations responded to this attack. What is the current situation and how are these three organisations responding? 

Technical Help Series

Introducing our latest collection of expert blogs on "Technical Help in Cybersecurity," designed to empower individuals and organisations with the knowledge and resources to safeguard their digital assets. Dive into cybersecurity as we explore the current landscape, the critical role of technical help, and best practices for seeking professional assistance. Equip yourself with practical DIY tips and tricks, and discover the emerging technologies shaping the future of cybersecurity.

Capturing Password Hashes: LLMNR/NBT-NS/mDNS Poisoning

This blog is about capturing password hashes and what DNS involves. Have a read below about how hackers can exploit this.

Understanding Incident Response

The blog discussed the key components of creating an effective incident response plan including identifying and prioritising IR plans, defining response procedures, and expectations such as updating the plan regularly.

Incident Response Service Breakdown

This blog breaks down our Incident Response Service including what is Incident Response, why businesses need it and how our IR package can help.

Valentines Day Dating Scams Warning

This blog covers Valentines Day and all the online dating scams that take place around the day including Phishing, Catfishing and Romance scams and how to protect yourself from these attacks.