Advertisement · 728 × 90

Posts by Pen Test Partners

Preview
New Warning — Microsoft Copilot AI Can Access Restricted Passwords Red team hackers have accessed restricted passwords using Microsoft’s Copilot AI for SharePoint — here’s what you need to know.

By me @forbes.com: Accessing restricted SharePoint passwords using Copilot AI. Excellent work by @pentestpartners.bsky.social, Jack Barradell-Johns and @thekenmunroshow.bsky.social

#infosec

www.forbes.com/sites/daveyw...

11 months ago 5 2 0 0
The Microsoft sharepoint logo (teal shapes with an "S") has a text bubble saying: "That file is restricted!"
A human (with their face obscured) in a black hoodie (printed with: clichéd h4x0r) says: "Copilot, I really need those passwords"
The Microsoft copilot logo (a rainbow swirly shape) replies: "OK, here you go..."

The Microsoft sharepoint logo (teal shapes with an "S") has a text bubble saying: "That file is restricted!" A human (with their face obscured) in a black hoodie (printed with: clichéd h4x0r) says: "Copilot, I really need those passwords" The Microsoft copilot logo (a rainbow swirly shape) replies: "OK, here you go..."

Our #RedTeam came across a massive #SharePoint, too much to explore manually.

So, with some careful prompting, they asked #Copilot to do the heavy lifting...

It opened the door to credentials, internal docs, and more.

📌 www.pentestpartners.com/security-blo...

#AIsecurity

11 months ago 1 1 0 1
Post image

🔐 Your passwords say more than you might think…

In our latest blog post, Pedro Venda shares some of the surprising insights hiding behind the passwords we choose and why it matters for security.

📌 www.pentestpartners.com/security-blo...

11 months ago 1 0 0 0
Post image

We hosted an away day for the UK easyJet security team, sharing insights, collaborating and discussing all things aviation security. ✈️

#AviationSecurity #CyberSecurity #SecurityCollaboration #KnowledgeSharing #WorkingTogether #AviationInsights

11 months ago 1 0 0 0
Post image

We are exhibiting! 🚨
 
There’ll be live demos, discussions, and friendly faces...
 
Come see us at the RSA Conference 2025 in San Francisco. We are at booth S-2144 in the South Expo from April 28th to May 1st.
 
➡️ www.pentestpartners.com/event/rsa-co...
 
#RSAC2025 #RSAC #CyberSecurity #InfoSec

11 months ago 0 0 0 0
Is your phone secretly listening to you? Well… yes
Is your phone secretly listening to you? Well… yes YouTube video by Pen Test Partners

Is your phone secretly listening to you?

Well… yes

But not how you might think, Ken Munro explains...

youtube.com/shorts/Y9KZu...

1 year ago 0 0 0 0
Post image

Data breaches usually make the headlines because of the sheer volume of data. However, research shows that often the volume of data is falsely inflated.

So, how do forensics experts tell what’s real and what’s noise?

read here: www.pentestpartners.com/security-blo...

1 year ago 0 0 0 0
Advertisement
Post image Post image Post image

Sometimes you just can’t beat being in the same room.

We’ve just wrapped up another round of co-working days across the UK, including London, Buckingham, Birmingham, Sheffield, Cardiff, Edinburgh, and Portsmouth.

A great chance for our team to meet up, share ideas, and collaborate.

#HybridWork

1 year ago 1 0 0 0
Post image

Using your work email for personal use may seem convenient, but it can put your company at risk. 🚫

If that third-party site gets breached, corporate credentials could fall into the wrong hands. For further details and tips for businesses to limit this risk: www.pentestpartners.com/security-blo...

1 year ago 0 0 0 0
Post image

Last week, Ken Munro and Jo Dalton were in Munich for Aerospace Tech Week. Ken Munro was talking about hacking electronic flight bags and the importance of security vulnerability disclosure in aerospace ✈️…

1 year ago 0 0 0 0
Post image

From August 1, 2025, any wireless device sold in the EU will need to meet stricter cybersecurity requirements under the Radio Equipment Directive (RED).

We’ve broken down what this means and how to get ready in our latest blog post: www.pentestpartners.com/security-blo...

1 year ago 1 0 0 0
Post image

Last week @thekenmunroshow.bsky.social presented at the EEMUA Conference 2025, looking at cyber security challenges shared between maritime and industrial systems in his talk, "Marine cyber security – plain sailing or a rough passage?"

1 year ago 0 1 0 0
Post image

Released by Intel in 1998, IPMI is a hardware management interface operating independently of the OS. Our latest blog post by Kieran looks at INTEL IPMI vulnerabilities and how to mitigate them
➡️ www.pentestpartners.com/security-blo...

1 year ago 3 0 0 0
Post image Post image

Our Sam Macdonald presented a talk on dealing with imposter syndrome at BSides Kent last weekend.
 
#BSidesKent #CyberCommunity #BSides #MentalHealth #ImposterSyndrome #Conference

1 year ago 2 1 0 0
Post image

If your organisation suffers a cyber incident, what you do next will determine the outcome. Our latest blog post is a practical playbook for the first 24 hours after a cyber incident...

Read the blog post and our checklist here: www.pentestpartners.com/security-blo...

1 year ago 0 0 0 0
Advertisement
Post image Post image Post image

@thekenmunroshow.bsky.social presented at the Maritime Cyber Guild 2025 meet up in Copenhagen, talking all things shipping with some photos of the Network Ferret himself, Andrew Tierney. 🚢

#maritimecybersecurity #maritimesecurity #cybersecurity #infosec #maritimesafety

1 year ago 1 0 0 0
Post image

Benefiting newbies, experts, and everyone in between, cybersecurity community groups are an excellent way to network and learn 💻 ...

Our latest blog post by Nick Simpson looks at how you can find UK groups, including OWASP, DEF CON groups, 2600 and more: www.pentestpartners.com/security-blo...

1 year ago 0 2 0 0
Post image

Our Warren Houghton is back at it again with Nerding Out with Viktor. Warren shares fascinating insights into how he successfully infiltrates secure spaces and bypasses sophisticated defences.
 
Watch the full episode here: vpetersson.com/podcast/S02E...

1 year ago 2 1 0 0
Post image

In our latest blog post, Kieran Larking highlights that the No-cache directive does not prevent caching and looks at typical caching behaviour directives and how to correctly use these directives to balance performance and security: www.pentestpartners.com/security-blo...

1 year ago 0 0 0 0
Post image

Looking to become a Cyber Essentials assessor?

In our latest blog post, Ekom Ibiok shares his journey to becoming a Cyber Essentials and Cyber Essentials Plus assessor with insights to help you on your own path: www.pentestpartners.com/security-blo...

1 year ago 3 0 0 0
Post image

Your DNS security can accidentally leak your entire subdomain structure. DNSSEC with NSEC/NSEC3 records is great for ensuring integrity and authentication but can be a sneaky way for attackers to ‘zone walk’ and enumerate your domains... www.pentestpartners.com/security-blo...

1 year ago 0 0 0 1
Post image Post image

Last week Ken Munro and Matt Dowson were in Dublin, Ireland, for the IATA World Data Symposium. We presented a talk covering some of the significant legacy cybersecurity risks in aviation systems.

#AviationCybersecurity #IATAWDS #LegacySystems #AviationSafety #CyberThreats

1 year ago 3 0 0 0
Advertisement
Post image

There are new mandatory United States Coast Guard cyber regulations for US flagged vessels and ports that come into effect on July 16. Be prepared. Full details and advice here: www.pentestpartners.com/security-blo...

#USCG #cyberregulations #maritimesecurity #cybercompliance #cyberawareness

1 year ago 0 1 0 0
Post image

In our latest blog, David Lodge looks at the Rockchip boot process. He covers the boot order and how to force the MCU into low-level modes for direct USB access, as well as essential tools like xrock and rkflashtool: www.pentestpartners.com/security-blo...

1 year ago 2 0 0 2
Post image Post image Post image

Ken Munro recently presented at BCS The Chartered Institute of IT with an evening on hacking various transport systems, including planes, trains, automobiles, and ships…

1 year ago 2 0 0 0
Post image

In aviation, cybersecurity is not optional. The industry recognises that ensuring safety requires a consistent, standardised approach. Alex Lomas explains the process of conducting avionics penetration tests, looking at each stage in line with ED-203A: 👉 www.pentestpartners.com/security-blo...

1 year ago 2 1 0 0
Security Flaws Found in Tiny Phones Promoted to Children
Security Flaws Found in Tiny Phones Promoted to Children YouTube video by Pen Test Partners

We got curious about cheap, tiny phones promoted to children on social media, so we bought a few to see what’s inside...

Read our blog on this here: www.pentestpartners.com/security-blo...

#CyberSecurity #DigitalSafety

1 year ago 2 1 0 0
The Mirai DVR botnet that took down Twitter and Facebook explained...
The Mirai DVR botnet that took down Twitter and Facebook explained... YouTube video by Pen Test Partners

In 2016, the first strain of Mirai distributed DDoS attacks against Twitter, Facebook, and KrebsOnSecurity. Initially, it was misunderstood as an IoT botnet. However, our reverse engineering revealed that it targeted digital video recorder software from a single vendor: youtu.be/5gYN

1 year ago 0 0 0 0
Post image

We revisited wearable device forensics to show how someone could gain unauthorised access to a Garmin smartwatch and expose your data such as activity logs, GPS data, sleep patterns, and device information: www.pentestpartners.com/security-blo...

1 year ago 2 1 0 0
Post image

Maritime cybersecurity isn’t just for large fleets—small operators face risks too. Complying with security standards can feel daunting, but it’s important to protect your systems and data from attack.

Read here: www.pentestpartners.com/security-blo...

1 year ago 0 2 0 0