FORTBRIDGE Profile Banner
FORTBRIDGE Profile
FORTBRIDGE

@FORTBRIDGE

Followers
168
Following
451
Media
561
Statuses
719

FORTBRIDGE โ€“ Leading IT Security Services in London | Cybersecurity, Penetration Testing, Red Teaming and Cloud Security

London, England
Joined November 2020
Don't wanna be here? Send us removal request.
@FORTBRIDGE
FORTBRIDGE
5 months
Our very own @Adrian__T presented at @Microsoft 's @BlueHatIL 2025 on "๐—ฉ๐—ฒ๐˜€๐˜๐—ฎ ๐—”๐—ฑ๐—บ๐—ถ๐—ป ๐—ง๐—ฎ๐—ธ๐—ฒ๐—ผ๐˜ƒ๐—ฒ๐—ฟ โ€“ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ฅ๐—ฒ๐—ฑ๐˜‚๐—ฐ๐—ฒ๐—ฑ ๐—ฆ๐—ฒ๐—ฒ๐—ฑ ๐—˜๐—ป๐˜๐—ฟ๐—ผ๐—ฝ๐˜† ๐—ถ๐—ป $๐—ฅ๐—”๐—ก๐——๐—ข๐— " ๐Ÿ“บ Watch the full talk here: https://t.co/Yy9jm1suAx #FORTBRIDGE #OffSec
0
2
3
@FORTBRIDGE
FORTBRIDGE
1 day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly discovered zero-day vulnerability in VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. Watch the video
0
0
2
@FORTBRIDGE
FORTBRIDGE
3 days
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert confirming that threat actors are actively exploiting critical vulnerabilities in Dassault Systรจmes DELMIA Apriso and XWiki. These flaws allow attackers to gain privileged access, execute
0
0
2
@Adrian__T
Lord Steak
3 days
Yesterday, I had the pleasure of speaking at @owaspporto , an incredible event bringing together passionate professionals and researchers dedicated to advancing application security. A big thank you to the OWASP Porto organizers, Wilberto Filho,Pedro Fortuna andย Nunoย Pereira for
0
2
3
@FORTBRIDGE
FORTBRIDGE
5 days
Microsoft has released an out-of-band emergency patch to fix a critical remote code execution (RCE) vulnerability in Windows Server Update Services (WSUS), now being actively exploited in the wild. Watch the video till the end to explore the details of this vulnerability, who is
0
0
2
@FORTBRIDGE
FORTBRIDGE
9 days
A critical vulnerability in Adobe Commerce and Magento Open Source platforms has come under active exploitation, with more than 250 online stores compromised within 24 hours, according to a report by Sansec. Watch the video till the end to explore the details of this
0
0
2
@FORTBRIDGE
FORTBRIDGE
10 days
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog after confirming it is being actively exploited in the wild. Watch the video till
0
0
2
@FORTBRIDGE
FORTBRIDGE
11 days
Japanese retail giant Muji has temporarily suspended its online store in Japan following a ransomware attack on its delivery partner, Askul Corporation. Watch the video till the end to explore the details of this incident, who is affected, mitigation strategies, and essential
0
0
2
@FORTBRIDGE
FORTBRIDGE
13 days
Cybersecurity researchers have uncovered a critical vulnerability in WatchGuard Fireware OS, the operating system that powers WatchGuard VPN and firewall appliances. The flaw could allow unauthenticated attackers to remotely execute arbitrary code and potentially take full
0
1
1
@FORTBRIDGE
FORTBRIDGE
16 days
Cybersecurity researchers have uncovered a new campaign, codenamed Operation Zero Disco, where attackers exploited a recently disclosed vulnerability in Cisco IOS and IOS XE software to deploy Linux rootkits and gain persistent control over targeted devices. Watch the video till
0
0
2
@FORTBRIDGE
FORTBRIDGE
17 days
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Adobe Experience Manager (AEM) vulnerability to its Known Exploited Vulnerabilities (KEV) catalog following confirmation of active exploitation in the wild. This flaw has received a CVSS score
0
0
2
@FORTBRIDGE
FORTBRIDGE
19 days
As the threat landscape evolves, CISOs need to adapt their focus. Watch the video till the end to see the five biggest priorities for CISOs in 2025, from AI risks to supply chain defense. ๐Ÿ” Concerned about your Company's Security? Ask FORTBRIDGE ! Our senior consultants,
0
0
1
@FORTBRIDGE
FORTBRIDGE
20 days
Oracle has issued an urgent security alert for a newly discovered vulnerability in its E-Business Suite. The flaw carries a CVSS score of 7.5 (High severity) and affects versions 12.2.3 through 12.2.14. Watch the video till the end to explore the details of this vulnerability,
0
0
3
@FORTBRIDGE
FORTBRIDGE
23 days
As more organizations shift to cloud-first infrastructures, security testing must evolve to match the complexity of modern cloud environments. Traditional pentesting alone canโ€™t uncover the risks unique to AWS, Azure, and GCP ecosystems. Our latest blog post breaks down
Tweet card summary image
fortbridge.co.uk
Discover everything you need to know about cloud penetration testing - what it is, how it differs from traditional pentesting, key attack vectors, tools, real-world case studies, and best practices.
0
0
1
@FORTBRIDGE
FORTBRIDGE
24 days
When CISOs step into the boardroom, they face tough questions on risk, compliance, and ROI. Watch the video till the end to explore the most common boardroom questions and how to answer them effectively. ๐Ÿ” Concerned about your Company's Security? Ask FORTBRIDGE ! Our senior
0
0
1
@FORTBRIDGE
FORTBRIDGE
25 days
Many people use โ€œRed Teamingโ€ and โ€œPenetration Testingโ€ interchangeably, but theyโ€™re not the same. While pentesting focuses on finding and exploiting vulnerabilities in specific systems, red teaming takes a broader, real-world adversary approach to test your entire security
0
0
1
@FORTBRIDGE
FORTBRIDGE
26 days
CISOs face a complex web of risks every day, from ransomware to regulatory pressure. Watch the video till the end to explore the top cybersecurity concerns that keep CISOs awake, and what can be done about them. ๐Ÿ” Concerned about your Company's Security? Ask FORTBRIDGE ! Our
0
0
1
@FORTBRIDGE
FORTBRIDGE
27 days
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new high-severity vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The flaw affects Smartbedded Meteobridge, a popular platform used to collect and manage weather station data.
0
0
1
@securestep9
Sam Stepanyan
29 days
Thank you for the photos and great feedback on the talks presented at the #OWASP @OWASPLondon Chapter meetup @Adrian__T ! The recordings and the links to slide decks will be published very soon on the OWASP London YouTube channel
@Adrian__T
Lord Steak
30 days
Had a great time attending the @OWASPLondon Meetup hosted at the @sageuk office! It was an excellent evening full of insights, discussions, and knowledge-sharing about application security and LLM security. Huge thanks to the speakers: Matias Madou, Dominic Whewell, and
2
2
8
@FORTBRIDGE
FORTBRIDGE
30 days
RT @Adrian__T: Had a great time attending the @OWASPLondon Meetup hosted at the @sageuk office! It was an excellent evening full of insigโ€ฆ
0
1
0
@FORTBRIDGE
FORTBRIDGE
1 month
With the growth of AI, attackers are finding new ways to exploit large language models (LLMs). From prompt injection to data exfiltration, these threats are evolving fast. Watch the video till the end to explore how LLM attacks work, examples of risks, and how businesses can
0
0
1