Security Blog

Feature development & monitoring tips

Category: General News

October 7, 2020

Pentest People Achieve place on G-Cloud 12 Framework

Pentest People Achieve place on G-Cloud 12 Framework Pentest People are happy to announce achieving a place on the G-Cloud 12 Framework within the Government Digital Marketplace. The position further proves our rapid growth and quality of our Penetration Testing Services. Along with our ever focused innovations within the industry, now applying our extensive experience […]

Find Out More
February 19, 2020

Pentest People on Crown Commercial Services Framework

Pentest People named as Supplier on Crown Commercial Services Framework This week saw Pentest People named as a supplier on the Crown Commercial Services (CCS) Framework. Allowing public sectors to find qualified cyber security companies like ourselves to perform work on sensitive systems. ‘Crown Commercial Service supports the public sector to achieve maximum commercial value […]

Find Out More
July 3, 2019

Pentest People Awarded Place on G-Cloud 11 Framework

This week Pentest People have not only become a CHECK service provider authorised by the NCSC, but also awarded a place on the G-Cloud 11 framework. Authorised by the UK Government. Our services are now easily available for any company/organisation operating within the public sector via G-Cloud. 

Find Out More
January 23, 2019

Why Developers Need A Pen Test

A quick Google search for ‘data breach’ returns countless results. Just recently our sister company, RapidSpike,  innocently found a data breach made by York City Council. It seems stories related to data breaches are reported daily. The results of a data breach vary; you could face hefty fines due to GDPR,  you could ruin your […]

Find Out More
January 22, 2019

CryptoJacking – Give Me Your Computing Power

CryptoJacking or ‘drive-by mining’ is an attack vector that became prevalent amongst hackers due to the rise in crypto currencies. Even though the market is currently struggling there are now over 2,000 different types of crypto currencies (not all of these are mineable). It is, therefore, no surprise that hackers have become interested in the […]

Find Out More
August 16, 2018

What is Clone Phishing?

This blog post covers Clone Phishing. What is Clone Phishing? How can you protect yourself from this Social Engineering attack?

Find Out More
August 15, 2018

What is Whaling?

In a previous blog post, we explained the basics of Phishing. This post will go into detail on another type of Social Engineering called Whaling. What is Whaling? Whaling is a type of Phishing attack that is targeted towards high-profile individuals. This may be people such as Corporate Executives, Politicians or Celebrities. In this case, the […]

Find Out More