Resources
Radical thinking and constant research inform all we do. Think ahead with shared intelligence from our Swarm of ethical hackers.


What is Fingerprinting in Ethical Hacking?
Fingerprinting (also known as footprinting) is the process of enumerating a target online presence, often the first step when planning…

Log4Shell RCE: Critical Zero Day Security Vulnerability
The vulnerability is within the Java library Apache log4j v2 and has been classified with a CVSSv3 base score of…

Password Policy Best Practices 2022
Your password is the gateway to your account. Once inside, a hacker can access a wealth of personal or company…

Video: An Ethical Hacker’s View on your Security (London CTOs)

Application Penetration Testing

What is Intrusive Penetration Testing?
Intrusive Penetration Testing is Penetration Testing where the risk of potential system impact or outage is not mitigated. For example,…

Office 365 Security Best Practices
Although Microsoft 365 has many built-in security features which can make the environment safe against attackers, this relies heavily on…

What is Penetration Testing as a Service (PTaaS)?
Penetration Testing as a Service (PTaaS), which is more commonly shortened to ‘Pen Test as a Service’ is the delivery…

Pentesting is DEAD.
Traditional ‘snapshot’ penetration testing cannot keep pace with modern rates of business and technology change. It is underpinned by an…