• Home
  • Services
    • Application Security
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • Application Programming Interface (API) Security Testing
      • Secure Code Review
    • Infrastructure Security
      • Cloud Security Testing
      • External Attack Surface Management (ASM)
      • Active Directory Security Assessment
      • Network Penetration Testing 
    • Specialised Security Testing
      • Operational Technology (OT) and Industrial Control Systems (ICS) Security Testing
      • Artificial Intelligence Security Testing
      • Embedded Device and Internet of Things Security Testing
    • Security Hardening & Reviews
      • Security Configuration Reviews
    • Adversary Emulation
      • Red Team Exercises
      • Adversary Simulation
      • Phishing and Social Engineering Assessments
    • Detection & Response
      • Purple Teaming
      • Threat Hunting
  • About Us
  • Resources
    • News
  • Contact
  • Home
  • Services
    • Application Security
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • Application Programming Interface (API) Security Testing
      • Secure Code Review
    • Infrastructure Security
      • Cloud Security Testing
      • External Attack Surface Management (ASM)
      • Active Directory Security Assessment
      • Network Penetration Testing 
    • Specialised Security Testing
      • Operational Technology (OT) and Industrial Control Systems (ICS) Security Testing
      • Artificial Intelligence Security Testing
      • Embedded Device and Internet of Things Security Testing
    • Security Hardening & Reviews
      • Security Configuration Reviews
    • Adversary Emulation
      • Red Team Exercises
      • Adversary Simulation
      • Phishing and Social Engineering Assessments
    • Detection & Response
      • Purple Teaming
      • Threat Hunting
  • About Us
  • Resources
    • News
  • Contact

News

Read cybersecurity insights from our team at Paladin Security.

calendar3 March 27, 2026

Assume Breach: How Insecure Microsoft 365 Configurations Open the Door for Attackers

Time and again, the results are strikingly consistent: the OT network is a single click away from disaster.
calendar3 March 27, 2026

From Office PC to PLC: A Hacker’s Journey into the Heart of OT

Time and again, the results are strikingly consistent: the OT network is a single click away from disaster.

We founded Paladin because we live and breathe cybersecurity.

We’re on a mission to work with you to secure your business and make the world a safer place.

QUICK LINKS

Our Services

Blog

Contact

COMPANY

Our Team

Privacy Policy

Copyright © 2026 Paladin Security

We founded Paladin because we live and breathe cybersecurity.

We’re on a mission to work with you to secure your business and make the world a safer place.

QUICK LINKS

Our Services

Blog

Contact

COMPANY

Our Team

Privacy Policy

Copyright © 2026 Paladin Security

We founded Paladin because we live and breathe cybersecurity.

We’re on a mission to work with you to secure your business and make the world a safer place.

QUICK LINKS

Our Services

Blog

Contact

COMPANY

Our Team

Privacy Policy

Copyright © 2026 Paladin Security