
Blocking Device Code Flow in Microsoft Entra ID
What is Device Code Flow Device code flow is an authentication mechanism typically used on devices with limited input capabilities—like smart TVs, IoT appliances, or CLI-based tools. A user initiates login on the device, which displays a code. The user then opens a browser on a separate device and enters ... Read More
Maximising network penetration testing’s effectiveness
Businesses rely heavily on their IT networks to store, process and transmit sensitive data. As cyber threats evolve and increase in sophistication, securing your network has become more critical than ever. Network penetration testing is one of the most effective ways to achieve this. It involves simulating real-world attacks on ... Read More

Introducing the new CREST Penetration Testing Accreditation Standard
CREST have publicly released their Accreditation Standards, which includes the standard for Penetration Testing. Our Director, Tim Reed, has been working closely with CREST on the development of this new Accreditation Standard, which requires member companies to meet the standards set by CREST in order to deliver accredited services. Our ... Read More

Automated vs manual penetration testing – which is best?
Today’s online world is a little like a virtual battlefield, rife with threats and vulnerabilities. So, having a strong cybersecurity posture for your business is crucial. Penetration testing – either automated or manual – is an essential tool to protect sensitive data and systems from hackers. These two methods aim ... Read More

Safeguard your business with mobile app penetration testing
Mobile applications have become an essential tool for businesses of all sizes to engage with customers, streamline operations and drive growth. However, the increasing reliance on mobile technology comes with a unique set of security challenges you can’t afford to overlook. Mobile applications introduce new attack surfaces and vulnerabilities that ... Read More

Uncovering vulnerabilities with white box penetration testing
As a business owner or IT professional, you understand the importance of protecting your company’s sensitive data, systems and reputation from cyber threats. One of the most effective ways to uncover vulnerabilities and strengthen your organisation’s security posture is through penetration testing, particularly white box penetration testing. White box penetration ... Read More

Uncovering vulnerabilities with white box penetration testing
As a business owner or IT professional, you understand the importance of protecting your company’s sensitive data, systems and reputation from cyber threats. One of the most effective ways to... The post Uncovering vulnerabilities with white box penetration testing appeared first on Sentrium Security ... Read More

Securing APIs through penetration testing
APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing organisations to innovate, collaborate and deliver value to their customers. However, as reliance on APIs grows, so does the need ... Read More
Securing APIs through penetration testing
APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing... The post Securing APIs through penetration testing appeared first on Sentrium Security ... Read More

An introduction to password security: How to crack a password
Online Password Cracking An online attack is performed in real-time, against live services or applications to compromise active user accounts. Such attacks typically occur when a malicious actor lacks direct access to the target system or application and aims to gain an initial foothold. The first step in conducting online ... Read More