
Tales from a Social Engineer – Phishing
In part 2 of 'Tales from a Social Engineer', Gyles talks us through Phishing methods and how its still to this day...
Find Out MoreFeature development & monitoring tips
In part 2 of 'Tales from a Social Engineer', Gyles talks us through Phishing methods and how its still to this day...
Find Out MoreThis the start of a Social Engineering Series by consultant Gyles Saunders, covering tales from the front lines and going in depth...
Find Out MoreAfter the recent news regarding the Depop account hacks, Josh Hickling, resident Web App tester explains how this has happened and how...
Find Out MorePentest People Achieve place on G-Cloud 12 Framework Pentest People are happy to announce achieving a place on the G-Cloud 12 Framework...
Find Out MoreThis blog provides insight into the common traits seen in security consultants that have written strong CVs, stood out in interviews, and...
Find Out MoreThis blog post aims to give a brief insight into some of the various lengths a criminal will go to gain a...
Find Out MoreAs mobile applications are becoming increasingly popular, the need to secure them is greater than ever. All mobile applications should implement these...
Find Out MoreCross Site Scripting (XSS) is one of the most well covered web application issues around, however it is surprising how little people...
Find Out MoreIn these crazy times everyone is adapting, some jobs make for easier remote working than others but what about a developer? This...
Find Out More