+44 (0) 20 7612 7777
Home
Services
Security Audit
Reduce vulnerabilities
Application Pentesting
mobile.agile, web services, code reviews
Breakout testing - Citrix and network pivoting
Build Reviews
NCSC IT Health Checks
Cloud and Virtualisation Testing
Device Testing/IOT testing
Infrastructure PenTesting
Managed Scanning Service (VA)
Mobile Application Testing
Red/Blue/Purple Teaming
Social Engineering
Supply Chain testing
Vulnerability Assessment
Wireless Testing
Compliance & Advisory
Increase compliance and data privacy
NCSC IT Health Checks
Cyber Essentials Plus
GDPR
ISO 27001
PCI DSS
PCI DSS QSA Consultancy
PCI DSS ASV Scanning
PECR
PSN Compliance (ITHC)
Training Services
Security Risk
Better secure networks
Architecture Security Review
CREST STAR Assessments
Cyber Space Intelligence (CYBINT)
Data discovery
External Internet discovery
Internal network discovery/mapping
Mergers and Acquisitions
Onsite/Remote Security Manager (CISO)
Open Source Intelligence Gathering (OSINT)
Physical Security Audit
Segmentation testing
Targeted attack resistance assessment
Virtual CISO
Incident Response
Improve all the collection and analysis of data
Breach Impact Assessments
eDisclosure\eDiscovery
Forensics
Forensics Readiness Plan
Gold Teaming
Malware Reverse Engineering
Intrusion analysis - Compromise Assessment
Incident Response
Technical Services Counter Measures (TSCM)
Training And Knowledge Transfer
Forensic First Responder (FFR)
Security Development Life Cycle (SDLC)
Secure By Design (SDB)
Apply for corporate account.
Talk to a cybersecurity expert.
Portal access.
Reporting access.
About Us
Company Information
Accreditations
Careers & Team
Privacy Policy
Anti-Slavery Policy
Events
News
Blog
Contact
Whispers of a friendly hacker...
Home
blog
<<
>
>
>>
Categories
Compliance
(2)
Malware
(2)
Security
(27)
Charity
(0)
GDPR
(0)
Forensics
(2)
Social Engineering
(2)
Technology
(3)
Cyber Security
(3)
Training and Learning
(0)
PCI DSS
(0)
Artificial Intelligence
(0)
SME
(0)
Governance, Risk, and Compliance
(1)
Opportunities
(0)
Recent Posts
23 May
The Role of Penetration Testing in Optimizing Zero Trust Policies
13 February
How to Bypass MFA with Modlishka reverse proxy tool
9 February
Hacking ChatGPT and Bing Chat: Enter Prompt Injection Attacks
Authors
ProCheckUp
Paul Bissette
Thomas Rusbridger
Procheckup Team
Richard Brain
Guy Newman
Dimitrios Fragkiskatos
Max de Dumast
Nga Hoang
David Shanahan
Edd Jones
David Tyler
Connor Cracknell
Cristian Ciomaga
Wei Hou Low
Brendan Yeo
Daniel Byrne
Authors