Our Approach

Akimbo Core began working in 2019, to address the weaknesses in the traditional approach to security testing. 

With companies relying on approaches that lead to a long mean-time-to-detection and that don’t take the whole organisational context into account — We wanted to do something different. 

That’s why we take a platform-first approach to security and continuous security testing.

Continuous Security Testing

The Problem

Many organisation’s utilise penetration testing to find, and remediate, security vulnerabilities within their internet facing systems. Traditional cybersecurity approaches such as penetration testing are often conducted annually, but that is not in-line with the way that systems and applications are developed. Regular changes and updates can introduce risks faster than those methods can detect.

Modern organisations are constantly at risk from cybercriminals. Keeping everything up-to-date and locked down is a fundamental part of cybersecurity - but issues may be missed and risk may unintentionally be introduced to your systems. To ensure that these problems can be found and fixed quickly, it's critical that your security stance is constantly tested.

Our Solution

We use penetration testing techniques to continuously assess your external risk profile, alerting you to changes on your attack surface or the threat landscape.

Akimbo Core offers “Always-on” Security Testing. This is a modern approach to cybersecurity that offers the benefits of penetration testing but is more effective and constantly active. We apply human intelligence to the complex parts and develop application-specific automation for the repetitive tasks.

This allows us to test far more frequently, more much efficiently and effectively when compared to traditional penetration testing.

We provide information about your security stance through an online platform, available 24/7, that allows you to view the security testing that's taking place, see your organisation's current level of risk, and gain assistance in remediating discovered security issues.

Akimbo Core Dashboard Screenshot

State of the Union

A dashboard shows the current security stance of your organisation, including outstanding issues as well as the on-going security testing work conducted.

Attack Surface Monitoring

New systems are highlighted within the dashboard to ensure they're not missed from the testing scope.

Vulnerability Alerts

High risk issues cause vulnerability alerts so you don't miss critical vulnerabilities or weaknesses. These can be configured to your desired threshold.

Continuous Asset Monitoring

The Problem

Many organisations focus their attention on perimeter security, however with the potential for targeted phishing attackers, insider threats, and a remote workforce – the idea of relying on a strong perimeter is outdated.

Organisations need to make sure that their assets are protected from attack from all angles, including when staff are working remotely, or from home.

Our Solution

There is more to cyber defence than strong perimeters, we track your assets to ensure they are hardened against attacks.

Our asset monitoring systems continuously monitor your systems to ensure they are hardened against attack. Tracking their vendor support, and offers actionable guidance to mitigate the risk of known vulnerabilities and to prevent exploitation.

All of your organisational assets are tracked within our dashboard allowing you to monitor their status and remediation over time.

Best Practice or Compliance

Whether you’re looking to track and harden your assets for best practices, or compliance reasons, our system can monitor your systems against the security requirements of your choice.

Each asset has a health bar that shows you how close it is to your compliance goal.

Akimbo Core Dashboard Screenshot

The Platform

A continuous view of the risk exposure of your organisation, with configurable alerts for new issues as soon as they are discovered. Our platform gives full control of your testing activities too.

The Problem

With a fluctuating risk profile, it can be very difficult to understand the current level of danger your organisation faces. Plus, many traditional security testing services have a significant delay between issue discovery and reporting – with reports often not arriving until many days after the end of the engagement.

Additionally, many security testing services still deliver reports in an unmanageable format – such as PDFs over email.

Our Solution

If you want a PDF copy of your report, we’ll send you one. However, our portal-first approach to security reporting gives you a continuously updated view into your organisations security.

Regardless of the type of security assessment requested, we continuously update your view of your organisation’s risk via our web platform.

You can view vulnerabilities as soon as they are confirmed. You can communicate directly with the testing team, such as to request additional information or to request a retest of a remediated issue. You can view a high-level report of the state of your systems, ideal for management meetings – or you can drill down into the technical detail needed to remediate a complex issue.

Akimbo Core Dashboard Screenshot


With new security issues being found constantly, it’s difficult to keep track of them all – or get any other work done if you even try.

That’s why we’ve set our platform up with configurable notifications, so that you can tell us what “critical” means to your business, and we’ll make sure to alert you to those issues, without overloading you with more minor details.

The Workflow

There’s no “I” in team, and so we’ve developed our platform to work well with teams of any size.

You can assign vulnerabilities to specific staff for remediation, you can message team members to discuss issues, and you can securely share issue details with those in your organisation that need to know.

Akimbo Core Dashboard Screenshot

Your Team

Granular access control allows you to share just the information you need with the people that need to see it. With group permissions simplifying the whole thing.

For example, you could give the management team an overview dashboard, your tech team all of the details needed to fix things, and your auditors read-only access to track compliance activities.

Knowledge Base

Some vulnerabilities are easy to fix, perhaps just a quick configuration change or a software update to install. Sadly, software vendors don’t always get it right and sometimes vulnerability remediation can be painful.

To simplify the process of hardening your systems we have a knowledge base of common hardening actions and articles covering the “how, what and why” of system hardening. From talking about modern approaches to password security, to the depths of group policy options.

All to make keeping your systems secure, simple.

Akimbo Core Dashboard Screenshot

Want to get in touch with the team?

Looking to learn more about Cybersecurity?

Controlled Chaos

Major outages in major public cloud providers such as Azure and AWS are rare, but they do happen. Today OVH had a major incident: “OVH datacenter burns down knocking major sites offline” and they’re not the only ones to experience these issues, for example Amazon had a major outage in November and Microsoft had one in September.

This prompted me to write up an article on Akimbo’s recent work building resilience into our platform, so today I’m going to talk a little bit about a couple of the features of AWS that allow for significant resilience and I’m going to do that by running you through my recent experiments on our platform which can be roughly summarised as “Turning things off to see what breaks.”

Read More

SQL Injection Exploitation: Out-of-Band

Out-of-band exploitation refers to exploits where the extracted information is received over a connection other than the one the payload was delivered over. It can be used to bypass defensive technologies as well as complicating the detection and response capability.

SQL Injection can be exploited out-of-band through protocols such as DNS in order to extract database contents. This is particularly useful as an alternative to Time-based exploitation where it can allow for faster extraction.

Read More

Strong Passwords

When performing security tests, we very often come across weak passwords. We often see dictionary words with suffixes such as Welcome1, Password123, or Lockdown2020. We also see "leet" substitutions, such as P@55w0rd, 3l3ph@nt, or L0ckd0wn.

In this post, we break down options for choosing more secure passwords.

Read More

Preventing Windows Accounts Being Bruteforced

In a previous article we discussed how bruteforcing Windows accounts is often easier than people expect. In this post - we'll cover some steps to harden these accounts.

Read More

Securing Wi-Fi Networks

We recently discussed how to break WPA2 keys very quickly using cloud computing. We've also looked at how to use a Rogue AP to capture user credentials from a network using PEAP (MSCHAP).

In this article we'll look at hardening Enterprise wireless networks from these attacks.

Read More

Fixing SQL Injection

SQL Injection is a vulnerability that occurs where user supplied input is insecurely concatenated into an SQL query.

We showed how easy can be to detect in our Finding SQL Injection article, and we’ve run through exploitation in many posts such as our post on Exploiting Error-based SQL Injection.

Read More