News
The RDP bitmap cache is a witness to remote desktop interactions, providing forensic analysts with an insight into past ...
Passwords are in principle a secret. Users assume that nobody else will ever see them and that they will not be shared, shown, or leaked publicly. In the security world, we all know and appreciate the ...
Anyone with a web browser and access to your phone in an unlocked state could potentially set up persistent access to your secure messaging platforms (without needing to know your credentials!).
Unallocated space retains remnants of deleted files, metadata, logs, caches, and other artefacts. This is useful if a user attempts to cover their tracks, delete files, reformat drives, or use ...
From 1st August 2025, mandatory cybersecurity requirements come into effect under the EU’s Radio Equipment Directive (2014/53/EU), or RED. This also applies to the UK market, since RED was implemented ...
Data breaches make the headlines usually because of the sheer volume of data Research shows that often the volume of data is falsely inflated How forensics experts can spot it When a data breach hits ...
People use whatever is convenient. Segregation of work and personal matters is a key part of security. Using corporate addresses tramples on this separation. Corporate email addresses should be ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results