
Pen Test Partners
@PenTestPartners
Followers
9K
Following
126
Media
263
Statuses
381
Pen Test Partners / PTP provides cyber security services to a huge variety of industries and organisations. [email protected].
Joined September 2010
We were recently on @BBCMorningLive, helping pet owners understand how they’d ended up paying for microchip services they didn’t remember signing up for. But there was a lot more behind the story. 📌We’ve written up our findings in full: #CyberSecurity
1
1
1
Deleted a folder? Shellbags is the accessory you need. They’re one of the most valuable forensic artifacts for tracing user activity in Windows, even if the folders are gone. This blog post by our @jwdfir walks through how Shellbags work, how to analyse them with tools like
0
3
3
Most Android apps don’t expose much through services. But system apps? That’s where things get interesting. This blog post by @tautology0 explains how Android services work and looks into the security risks of AIDL (Android Interface Definition Language) services. They’re
0
2
4
Attackers aren’t always bringing their own tools. More and more, they’re using what’s already on your systems, like PowerShell and Rundll32, to stay off the radar. In this video, our @CyberTibiAtya explains how to catch them with chain detections and why prevention tools like
0
0
2
Can AI help you examine leaked data safely?.If you do it right, it can. In this blog post, our @CyberTibiAtya looks at how internal chatbot systems, built on private large language models, can support forensic investigations. He shows how AI can help find important
0
0
1
One weakness in a single device could affect thousands. That could put real pressure on the grid. To comply, manufacturers must meet the ETSI EN 303 645 cybersecurity standard as a baseline by late 2026 or early 2027. 📌Read More: #SmartHeatPumps
0
3
3
Our @TheKenMunroShow recently spoke at the @ISACAWinchester Chapter’s 15th anniversary AGM, presenting various topics in the world of transport cybersecurity. Real-world vulnerabilities, such as those in ships, planes, and cars, often go unnoticed when software interacts with
0
0
5