FORTBRIDGE
@FORTBRIDGE
Followers
168
Following
451
Media
561
Statuses
719
FORTBRIDGE โ Leading IT Security Services in London | Cybersecurity, Penetration Testing, Red Teaming and Cloud Security
London, England
Joined November 2020
Our very own @Adrian__T presented at @Microsoft 's @BlueHatIL 2025 on "๐ฉ๐ฒ๐๐๐ฎ ๐๐ฑ๐บ๐ถ๐ป ๐ง๐ฎ๐ธ๐ฒ๐ผ๐๐ฒ๐ฟ โ ๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐ฅ๐ฒ๐ฑ๐๐ฐ๐ฒ๐ฑ ๐ฆ๐ฒ๐ฒ๐ฑ ๐๐ป๐๐ฟ๐ผ๐ฝ๐ ๐ถ๐ป $๐ฅ๐๐ก๐๐ข๐ " ๐บ Watch the full talk here: https://t.co/Yy9jm1suAx
#FORTBRIDGE #OffSec
0
2
3
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly discovered zero-day vulnerability in VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. Watch the video
0
0
2
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert confirming that threat actors are actively exploiting critical vulnerabilities in Dassault Systรจmes DELMIA Apriso and XWiki. These flaws allow attackers to gain privileged access, execute
0
0
2
Yesterday, I had the pleasure of speaking at @owaspporto , an incredible event bringing together passionate professionals and researchers dedicated to advancing application security. A big thank you to the OWASP Porto organizers, Wilberto Filho,Pedro Fortuna andย Nunoย Pereira for
0
2
3
Microsoft has released an out-of-band emergency patch to fix a critical remote code execution (RCE) vulnerability in Windows Server Update Services (WSUS), now being actively exploited in the wild. Watch the video till the end to explore the details of this vulnerability, who is
0
0
2
A critical vulnerability in Adobe Commerce and Magento Open Source platforms has come under active exploitation, with more than 250 online stores compromised within 24 hours, according to a report by Sansec. Watch the video till the end to explore the details of this
0
0
2
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog after confirming it is being actively exploited in the wild. Watch the video till
0
0
2
Japanese retail giant Muji has temporarily suspended its online store in Japan following a ransomware attack on its delivery partner, Askul Corporation. Watch the video till the end to explore the details of this incident, who is affected, mitigation strategies, and essential
0
0
2
Cybersecurity researchers have uncovered a critical vulnerability in WatchGuard Fireware OS, the operating system that powers WatchGuard VPN and firewall appliances. The flaw could allow unauthenticated attackers to remotely execute arbitrary code and potentially take full
0
1
1
Cybersecurity researchers have uncovered a new campaign, codenamed Operation Zero Disco, where attackers exploited a recently disclosed vulnerability in Cisco IOS and IOS XE software to deploy Linux rootkits and gain persistent control over targeted devices. Watch the video till
0
0
2
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Adobe Experience Manager (AEM) vulnerability to its Known Exploited Vulnerabilities (KEV) catalog following confirmation of active exploitation in the wild. This flaw has received a CVSS score
0
0
2
As the threat landscape evolves, CISOs need to adapt their focus. Watch the video till the end to see the five biggest priorities for CISOs in 2025, from AI risks to supply chain defense. ๐ Concerned about your Company's Security? Ask FORTBRIDGE ! Our senior consultants,
0
0
1
Oracle has issued an urgent security alert for a newly discovered vulnerability in its E-Business Suite. The flaw carries a CVSS score of 7.5 (High severity) and affects versions 12.2.3 through 12.2.14. Watch the video till the end to explore the details of this vulnerability,
0
0
3
As more organizations shift to cloud-first infrastructures, security testing must evolve to match the complexity of modern cloud environments. Traditional pentesting alone canโt uncover the risks unique to AWS, Azure, and GCP ecosystems. Our latest blog post breaks down
fortbridge.co.uk
Discover everything you need to know about cloud penetration testing - what it is, how it differs from traditional pentesting, key attack vectors, tools, real-world case studies, and best practices.
0
0
1
When CISOs step into the boardroom, they face tough questions on risk, compliance, and ROI. Watch the video till the end to explore the most common boardroom questions and how to answer them effectively. ๐ Concerned about your Company's Security? Ask FORTBRIDGE ! Our senior
0
0
1
Many people use โRed Teamingโ and โPenetration Testingโ interchangeably, but theyโre not the same. While pentesting focuses on finding and exploiting vulnerabilities in specific systems, red teaming takes a broader, real-world adversary approach to test your entire security
0
0
1
CISOs face a complex web of risks every day, from ransomware to regulatory pressure. Watch the video till the end to explore the top cybersecurity concerns that keep CISOs awake, and what can be done about them. ๐ Concerned about your Company's Security? Ask FORTBRIDGE ! Our
0
0
1
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new high-severity vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The flaw affects Smartbedded Meteobridge, a popular platform used to collect and manage weather station data.
0
0
1
Thank you for the photos and great feedback on the talks presented at the #OWASP @OWASPLondon Chapter meetup @Adrian__T ! The recordings and the links to slide decks will be published very soon on the OWASP London YouTube channel
Had a great time attending the @OWASPLondon Meetup hosted at the @sageuk office! It was an excellent evening full of insights, discussions, and knowledge-sharing about application security and LLM security. Huge thanks to the speakers: Matias Madou, Dominic Whewell, and
2
2
8
RT @Adrian__T: Had a great time attending the @OWASPLondon Meetup hosted at the @sageuk office! It was an excellent evening full of insigโฆ
0
1
0
With the growth of AI, attackers are finding new ways to exploit large language models (LLMs). From prompt injection to data exfiltration, these threats are evolving fast. Watch the video till the end to explore how LLM attacks work, examples of risks, and how businesses can
0
0
1