pentestltd Profile Banner
Pentest Profile
Pentest

@pentestltd

Followers
1K
Following
579
Media
699
Statuses
992

We put your organisation's #Cybersecurity efforts to the test, providing you with the cybersecurity confidence you need. Part of Shearwater Group plc.

United Kingdom
Joined April 2019
Don't wanna be here? Send us removal request.
@pentestltd
Pentest
2 years
πŸ’₯SUCCESS!!! πŸŽ‰. @_s_n_t successfully compromises the Samsung Galaxy S23 at #Pwn2Own Toronto 2023!!. Well done Sam, amazing work πŸ‘πŸ‘πŸ‘.
@thezdi
Trend Zero Day Initiative
2 years
Success! Pentest Limited was able to execute an Improper Input Validation against the Samsung Galaxy S23. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
Tweet media one
Tweet media two
0
2
5
@pentestltd
Pentest
8 months
As the Out of Office messages start to be put up, we wanted to wish everyone a very Merry Christmas from all of us here at Pentest Limited. *<]:{)
Tweet media one
0
0
0
@grok
Grok
5 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
363
650
3K
@pentestltd
Pentest
9 months
Happy thanksgiving to all our US clients, staff & friends. Have a great day!!
1
1
1
@pentestltd
Pentest
11 months
Using JSON Web Tokens (JWTs) for your application/API's session management? . Richard Mason outlines some of the most common security issues we find during testing and how you can mitigate against them.
Tweet media one
0
1
2
@pentestltd
Pentest
1 year
There is often a balance between convenience & security when it comes to password managers. Paul Johnston discusses these potential issues and shares the password he uses.
Tweet media one
0
1
1
@pentestltd
Pentest
1 year
If you understand the likely steps of an attack, you can better protect your organisation. That's where the Cyber Kill Chain comes in. Mark Rose take a look at the Cyber Kill Chain and how it can be used to help improve your cybersecurity posture.
Tweet media one
0
1
1
@pentestltd
Pentest
1 year
Reporting isn't just a piece of paper or a pdf delivered at the end of a test, it's an ongoing process. See how we can tailor our reporting process to meet your specific needs and adapted to your ways of working.
Tweet media one
0
0
0
@pentestltd
Pentest
1 year
Threat actors – who are they and what do they want from your organisation? . Mark Rose takes a look at your technology stack, the threats and how you can improve your security posture -
Tweet media one
0
2
2
@pentestltd
Pentest
1 year
We take a look at some of the most common, high-risk web application issues we identify throughout our testing.
Tweet media one
0
0
0
@pentestltd
Pentest
1 year
The CrowdStrike incident highlighted the importance of the digital supply chain & although not a hack, showed what could be done if a supplier were to be breached. So, how can organisations better secure their digital supply chain? We take a look:
Tweet media one
0
1
1
@pentestltd
Pentest
1 year
Are your cloud-based applications at heightened risk of cross-tenant attack?. Paul Johnston discusses the issues and how you can go about creating a secure application architecture.
Tweet media one
0
2
2
@pentestltd
Pentest
1 year
Happy 4th of July to all our US clients, staff and friends!!!
0
0
0
@pentestltd
Pentest
1 year
Who is targeting your organisation? . Mark Rose helps you get a clear picture of your technology stack, identify likely threat actors and ultimately, improve your cybersecurity posture.
Tweet media one
0
0
0
@pentestltd
Pentest
1 year
Happy Birthday to us, Happy Birthday to us, Happy Birthday to Pentest, Happy Birthday to us!! πŸŽ‰ . Pentest - 23 years old today! Here's to many more. Big thank you to everyone who has been involved in Pentest (past and present) for helping us get this far. πŸ™Œ
0
1
4
@pentestltd
Pentest
1 year
β€œI thought you were hackers. Surely you don’t need this?”. Many clients are surprised when we ask for IPs to be whitelisted, creds to be provided or for access to source code for testing. There's a simple reason we ask, more info = more thorough testing.
Tweet media one
0
0
0
@pentestltd
Pentest
1 year
How secure are your web applications?. We take a look at some of the common high-risk issues we find during our web app penetration testing -
Tweet media one
0
0
0
@pentestltd
Pentest
1 year
AI is all the rage & many organisations are starting to use AI technology to enhance their chatbots. But what security challenges do AI chatbots face? . We outline some concerns & share practical steps to ensure your AI chatbots are as secure as possible.
Tweet media one
0
1
1
@pentestltd
Pentest
2 years
RT @TheZDIBugs: [ZDI-24-087|CVE-2023-22817] (Pwn2Own) Western Digital MyCloud PR4100 RESTSDK Server-Side Request Forgery Vulnerability (CVS….
Tweet card summary image
zerodayinitiative.com
(Pwn2Own) Western Digital MyCloud PR4100 RESTSDK Server-Side Request Forgery Vulnerability
0
4
0
@pentestltd
Pentest
2 years
RT @TheZDIBugs: [ZDI-24-088|CVE-2023-22819] (Pwn2Own) Western Digital MyCloud PR4100 RESTSDK Uncontrolled Resource Consumption Denial-of-Se….
Tweet card summary image
zerodayinitiative.com
(Pwn2Own) Western Digital MyCloud PR4100 RESTSDK Uncontrolled Resource Consumption Denial-of-Service Vulnerability
0
2
0
@pentestltd
Pentest
2 years
The web-based AI chatbots are coming!! πŸ€– πŸ€– . But what are the security challenges they face and how do you go about protecting them from threats, as well as the risk of manipulation and misuse. Michael Minchinton gives his security insights.
0
2
3
@pentestltd
Pentest
2 years
Big thanks to @OwaspMcrπŸ™Œfor arranging tonight's OWASP event & giving us the chance to sponsor the food and drink πŸ•πŸ•πŸ»πŸ». Also, thanks to @AmazonUK for hosting, the speakers (Stuart Crawford & @tom_bluu) & of course everyone who attended!!!
Tweet media one
Tweet media two
1
2
7