<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
German website
search
close

Cybersprint

Recent Posts

Controlling Risks at the Municipality of The Hague

The Hague is the administrative and political capital of the Netherlands. International city of peace, justice and security. As far as the latter is concerned, it is not just about physical safety, but increasingly also about digital safety or cyber security. The municipality of The Hague has high ambitions when it comes to cyber security and improving digital services. The desire to digitise is inextricably linked to cyber security: the more processes go digital, the more important it is to ensure they are secure.

read more

Swagger API: Discovery of API data and security flaws

APIs (Application Programming Interface) are used by applications to communicate and interact between systems, access data, and much more. It makes sure you get the correct response on a request. However, if someone were to intercept this request-response, they could potentially misuse the data or alter the process. Cyber-criminals scan the internet for unsecured APIs on a daily basis. If not properly secured, this can lead to unauthorised access to internal data or customer information. What’s more, in some cases it allows tampering with data directly from an exposed API. This technical article focuses on mapping and discovering Swagger APIs throughout the EU. We will present how we discovered those APIs and checked for misconfigured examples. We will illustrate each step using screenshots, present the results, and provide defensive recommendations. Research conducted by Soufian El Yadmani, Security Analyst at Cybersprint The interactive map below shows how many Swagger APIs we found, and in which region. You can click, drag and zoom to see how many Swagger APIs were found in your area.    

read more

Cybersprint 5-year anniversary

2020 marks our five-year anniversary! To celebrate, we have published five video interviews about our journey so far. 

read more

Bad actors leveraging crises: 3 types of activities to watch out for

2020 is surely not starting out as we expected, as the horrible virus is disrupting and even ending the lives of many. We have mixed emotions writing this up, because there many people doing way more important work, like healthcare workers. Unfortunately, the bad guys have leveraged the crisis like clockwork. We looked at the three most common activities of bad actors.

read more

Comparing Germany's Digital Risk to Western Europe's

Cybersprint is expanding their services in Germany. The development and awareness of cyber security in the German markets is interesting to see. This inspired us to make a comparative analysis of the cyber-resilience between German organisations and those in the rest of Western Europe. Does the German approach to regulatory control and cybersecurity result in a noticeable difference?

read more

How banks can avoid biting in a phisher's hook

How do you rob a bank in 2019? Forget balaclavas, safecrackers and getaway cars. All you need is a laptop, some software and a little imagination. The result? A phishing “business”, which fools online banking users into thinking they are logging into their account, when they are actually giving away their login details to cybercriminals. Bank customers have always been the easy target in this kind of scam. A report from Kaspersky Labs found that almost 50% of phishing campaigns used this method. But as banks have improved their fraud prevention measures to protect their customers, the focus of the phishers has broadened to include the banks themselves.

read more

Cyber-resilience for government: how safe are you and your citizens?

As more and more public services go online, citizens need to feel they can trust governments with their data – especially those reluctant to start using digital versions of familiar services such as passport renewal or residency registration. Moreover, sensitive government documents and sensitive communication channels between departments and politicians need to be kept secure, even as cyberthreats become increasingly sophisticated and effective. Digital Risk Protection (DRP) solutions are a key element of cyber-defence strategies for public sector organisations when it comes to keeping citizens, politicians and their data safe.

read more

How to maximise productivity by minimising digital risk

Downtime, especially when it happens unexpectedly, is the enemy of productivity. Just ask Sony. When their online gaming platform was hacked in 2011, the service had to be taken offline for a month, resulting in unplanned costs of around $171 million, not including the reputational damage caused by 77 million user accounts being compromised. So, what can you do to prevent this kind of disaster?

read more

Help, where's my revenue?

It looks like your website. It feels like your website. It even works like your website. There’s just one problem: it’s not your website. It’s a fake, set up by cyber crooks to defraud your loyal customers by taking their money and delivering fake goods, or perhaps nothing at all. Not only does this kind of fakery have a damaging impact on your brand’s reputation, it also costs millions of dollars per year. And perhaps the most worrying thing of all is that setting up this kind of criminal enterprise is surprisingly easy to do. So what kind of solutions are there?

read more

Do you have a question?

Our experts have the answers

Contact us