<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
search
close

Forwarding your call: How do DNS and CNAME records work?

The web is in a continuous state of dynamic development, with websites being created, updated, and deleted every day. These websites are the digital equivalent of a rented property. Similar to physical properties, visitors will need a precise address to visit you.

Read more

CEO chat: reflections & predictions

28 January 2021 | 4pm CET - 10am EST The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021. 

Read more

Cybersprint at e-Crime Conference DACH

Cybersprint will join the virtual e-Crime Conference DACH on 14 January 2021. Our SVP Strategy Eward Driehuis will discuss ‘Present and future attack factors’ and what you can do to protect your organisation. Register at https://akjassociates.com/form/virtual-dach-2021-jan 

Read more

Cybersprint included in 'Now Tech' report by Independent Research Firm

Cybersprint is proud to have been recognised in a new research report by Forrester; the Now Tech: External Threat Intelligence Services, Q4 2020. The report provides an overview of 30 External Threat Intelligence Services providers, helping organisations choose the right service for their needs.

Read more

Digital Footprint explained: What is it & where does it come from?

It's the term we use the most: Digital Footprint. It is the foundation of your organisation’s digital infrastructure. It’s the starting point of your IT security policies, configuration database management, vulnerability mitigation, and much more. In this blog, we’ll shortly describe what drives the need for a Digital Footprint solution, share our definition of the term, and explain how it minimises the risks to your brand.

Read more

Give our hacker a nickname & win a custom Cybersprint lego set

We're feeling the Christmas spirit! As a thank-you and appreciation token for our customers, we've put together a unique and custom lego set. We received many enthusiastic reactions over the past days, from more people than just our customers. So we decided to offer our followers a chance to receive this unique lego set as well! Read below how you can participate to win one of the three limited edition sets. 

Read more

Swagger API: Discovery of API data and security flaws

APIs (Application Programming Interface) are used by applications to communicate and interact between systems, access data, and much more. It makes sure you get the correct response on a request. However, if someone were to intercept this request-response, they could potentially misuse the data or alter the process. Cyber-criminals scan the internet for unsecured APIs on a daily basis. If not properly secured, this can lead to unauthorised access to internal data or customer information. What’s more, in some cases it allows tampering with data directly from an exposed API. This technical article focuses on mapping and discovering Swagger APIs throughout the EU. We will present how we discovered those APIs and checked for misconfigured examples. We will illustrate each step using screenshots, present the results, and provide defensive recommendations. Research conducted by Soufian El Yadmani, Security Analyst at Cybersprint The interactive map below shows how many Swagger APIs we found, and in which region. You can click, drag and zoom to see how many Swagger APIs were found in your area.    

Read more

MAPPING A COMPLEX DIGITAL FOOTPRINT at PostNL

Over the years, the organisation has grown through expansions, mergers and acquisitions, making its digital footprint rather complex. Gunther Cleijn, Cyber Security Officer explains how he and his team work to ensure the security and daily productivity of the organisation. 

Read more

Webinar: Ransomware Submarine

In this on-demand webinar, Intel471 and Cybersprint take you down into the depths of enterprise ransomware. What can you do to protect your organisation? 

Watch Webinar

IT Governance: OVERSEEING YOUR DIGITAL FOOTPRINT

Organisational reliance on IT is increasing and outsourcing of services grows. What individual components are necessary for successful IT governance strategy

Download Now

HÂCK THE HAGUE 2021

27/09/2021 | Always wanted to try and ethically hack the city of The Hague? This is your chance! Pre-register for Hâck The Hague 2021.

See event

Do you have a question?

Our experts have the answers

Contact us