WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Penetration Testing – Use Caution When Selecting a Provider
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Penetration Testing – Use Caution When Selecting a Provider

Author: Jennifer Walker

Created: Thursday, August 8, 2019 - 16:31

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

While penetration tests (pentests) are a valuable tool in the cyber-quiver to find network vulnerabilities before the bad guys do, a lack of standards contribute to questionable practices that expose sensitive client data in publicly available repositories. In a recent report published by cybersecurity firm Cylance, the BlackBerry Cylance Threat Intelligence Team expresses concern that some penetration testers (pentesters) have adopted tactics, techniques, and procedures (TTPs) used by real advanced persistent threat (APT) actors, thus blurring the line between nefarious and legitimate pentest engagements and exposing sensitive client data. Further confounding the issue is the use of open source and off-the-shelf tools, such as  Mimikatz, Metasploit, PowerShell, and PSExec by both pentest practitioners and threat actors. The report, Thin Red Line – Penetration Testing Practices, also points out that some standards exist but lack consistency, thus resulting in the absence of defined best practices and no formal standards or ethics framework. Until such standards are developed and universally accepted, members are encouraged to use the research to ask questions of potential pentest engagements on their practices and safeguarding/handling of data (and provide this report as food for thought to your favorite pentester). Download the report at Cylance

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar