Recent Blog Posts

The 8 Ways You're Getting Hacked

The 2024 Pentesting Roadmap: From Beginner to Hired in 8 Steps
From beginner to hired in 8 steps! A beginner-friendly guide to fast-track your journey and master the skills needed to land a penetration testing job.

How MFA Saves Your Social Media Accounts
There is a good reason every single security expert in the world insists on enabling Multi-Factor Authentication (MFA) wherever you can. These are my answers to the most frequent arguments against MFA on social media and email accounts.

This Week in Cybersecurity — 16 September
This week's news in Cybersecurity. Ivanti is the gift that keeps on giving, more fake coding tests, and frustrating days for TfL employees

Tackling the Rising Supply Chain Threats in 2024
Supply Chain attacks are on the rise, and very difficult to defend against. This is how ‘Assumed Breach’ testing can protect your business and help you sleep better at night.

Pentesting Success: Mastering the Presale and Scoping Process
The technical parts of being a pentester is only one side of the story. Unlock the full potential of your pentests by asking the right questions during meetings with potential clients.