It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.
Read editorialLIVE PANELDISCUSSIE: TRAIN AS THEY FIGHT
by Cybersprint // 01-04-2021
20-04-2021 | Cybercriminelen dringen volautomatisch jouw IT systemen binnen via zwakke plekken of via jouw leveranciers. Hoe bereid je je hierop voor? Experts delen hun inzichten
Read moreDie Angriffsfläche Ihres Unternehmens aus der Sicht eines Hackers
by Cybersprint // 01-04-2021
06-05-21 | Mit zunehmender Digitalisierung und der Nutzung von Cloud-Services steigt das Angriffspotenzial auf die digitale Infrastruktur von Unternehmen. Hacker nutzen neueste Technologien, um Schwachstellen ausfindig zu machen und starten mit diesem Wissen Ihre Angriffe
Read moreEditorial: Exchange CVEs: The Response Plan Gap
by Eward Driehuis // 30-03-2021
It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us. I’ll go over them, and give tips on how these problems can be avoided in the future.
Read moreEditorial: Supply chain attacks
by Eward Driehuis // 11-03-2021
Today, supply chain attacks are as abundant as they are elusive. However, as many parties communicate about the dangers and their technical solutions, not much is said about the basics of supply chains attacks. I have written this article based on my personal experiences knowledge on the subject. I hope it answers most of your questions about the topic, so that you have a solid basis to expand your supply chain security from.
Read moreSupply Chain Attacks
by Eward Driehuis // 11-03-2021
Eward shares his personal insights on the 3 types of supply chains, the potential threats of each one to your organisation, and how to minimise these risks.
Read editorialMicrosoft Exchange CVE: Ransomware attacks incoming
by Cybersprint // 10-03-2021
A new wave of ransomware attacks is incoming. The Microsoft Exchange CVEs have already been extensively leveraged by criminals, resulting in secret access paths into organisations. Now, these attacks are waiting to be weaponised.
Read moreMicrosoft Exchange CVE: How to scan your systems for the vulnerability
by Cybersprint // 08-03-2021
The breach and data leak of Microsoft’s Exchange Server email software leaves many, many organisations vulnerable to attacks. A vulnerability is being actively abused by hackers to gain access to organisation’s systems. This technical article aims to help IT Security professionals find out which parts of their infrastructure may be vulnerable.
Read moreOn-Demand webinar | CEO chat: reflections & predictions
by Cybersprint // 04-03-2021
The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021.
Watch on-demandFT1000: Cybersprint listed as Europe's fastest-growing cybersecurity company
by Cybersprint // 04-03-2021
We’re delighted to share that the Financial Times has listed Cybersprint as Europe's fastest-growing cybersecurity company of 2021.
Read moreAttack Surface Management compared to 5 security technologies
by Sebastiaan Bosman // 25-02-2021
In this blog, we'll cover our attack surface management approach compared to five existing security approaches. What methods do they share? And where do they complement each other? We'll have a look at these techniques: 1. Asset discovery 2. Vulnerability management 3. Penetration testing 4. Red teaming 5. Supplier security governance Each has some touch points with attack surface management. For this comparison, we build on our earlier explanations of the concept. In the first blog, we gave our definition and summarised what drives the need for the solution. You can read our second blog to see how attack surface management is positioned with regards to External Threat Intelligence.
Read moreHÂCK THE HAGUE 2021
by Cybersprint // 07-09-2020
27-09-2021 | Always wanted to try and ethically hack the city of The Hague? This is your chance! Pre-register for Hâck The Hague 2021.
See event