Blog https://www.cybersprint.com/blog Stay informed with Cybersprint's blog. Learn about cyber threat intelligence analysis, industry perspective, product updates, company news, and more. en Tue, 07 Jun 2022 09:55:23 GMT 2022-06-07T09:55:23Z en Disinformation: a certainty in uncertain times https://www.cybersprint.com/blog/disinformation-a-certainty-in-uncertain-times <div class="hs-featured-image-wrapper"> <a href="https://www.cybersprint.com/blog/disinformation-a-certainty-in-uncertain-times" title="" class="hs-featured-image-link"> <img src="https://www.cybersprint.com/hubfs/Disinformation-social.png" alt="Disinformation: A Certainty in Uncertain times" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Since the beginning of the internet, we have seen a near, if not an exponential, surge of information sharing amongst users in cyberspace. Not long after, we saw how the emergence of social media ushered an access to public online platforms where other internet users worldwide could share, discuss, promote, and consume information, whether by deliberate choice or not.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybersprint.com/blog/disinformation-a-certainty-in-uncertain-times" title="" class="hs-featured-image-link"> <img src="https://www.cybersprint.com/hubfs/Disinformation-social.png" alt="Disinformation: A Certainty in Uncertain times" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Since the beginning of the internet, we have seen a near, if not an exponential, surge of information sharing amongst users in cyberspace. Not long after, we saw how the emergence of social media ushered an access to public online platforms where other internet users worldwide could share, discuss, promote, and consume information, whether by deliberate choice or not.</p> <img src="https://track.hubspot.com/__ptq.gif?a=5479065&amp;k=14&amp;r=https%3A%2F%2Fwww.cybersprint.com%2Fblog%2Fdisinformation-a-certainty-in-uncertain-times&amp;bu=https%253A%252F%252Fwww.cybersprint.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Analyst Report Tue, 07 Jun 2022 08:00:28 GMT t.garkava@cybersprint.com (Taisiia Garkava) https://www.cybersprint.com/blog/disinformation-a-certainty-in-uncertain-times 2022-06-07T08:00:28Z Threat Report: Remote vulnerability in Confluence, fixes available https://www.cybersprint.com/blog/threat-report-remote-vulnerability-in-confluence-fixes-available <p><span>On 2 June, 2022 a critical vulnerability was identified in Atlassian Confluence (</span><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html"><span>CVE-2022-26134</span></a><span>). The vulnerability in question relates to active exploitation of unauthenticated remote code execution in Confluence Data Center and Server; meaning that the vulnerability could lead to code being executed remotely.&nbsp;</span><span>&nbsp;</span></p> <p><span>On 2 June, 2022 a critical vulnerability was identified in Atlassian Confluence (</span><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html"><span>CVE-2022-26134</span></a><span>). The vulnerability in question relates to active exploitation of unauthenticated remote code execution in Confluence Data Center and Server; meaning that the vulnerability could lead to code being executed remotely.&nbsp;</span><span>&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=5479065&amp;k=14&amp;r=https%3A%2F%2Fwww.cybersprint.com%2Fblog%2Fthreat-report-remote-vulnerability-in-confluence-fixes-available&amp;bu=https%253A%252F%252Fwww.cybersprint.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> News Analyst Report Fri, 03 Jun 2022 13:12:21 GMT https://www.cybersprint.com/blog/threat-report-remote-vulnerability-in-confluence-fixes-available 2022-06-03T13:12:21Z Cybersprint Looking back on the 2021 vulnerability: Log4shell https://www.cybersprint.com/blog/looking-back-on-the-2021-vulnerability-log4shell <div class="hs-featured-image-wrapper"> <a href="https://www.cybersprint.com/blog/looking-back-on-the-2021-vulnerability-log4shell" title="" class="hs-featured-image-link"> <img src="https://www.cybersprint.com/hubfs/Log4Shell.png" alt="Looking back on the 2021 vulnerability: Log4shell" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>In December 2021 a critical vulnerability surfaced named Log4shell within Log4j, a widely used logging tool for java applications. Log4j is used globally by computers running online services, which meant it impacted a multitude of people, organisations, and government organisations. Since then, <a href="https://logging.apache.org/log4j/2.x/security.html">multiple fixes</a> have been implemented in the hope to avoid such an outbreak in the future.</span></p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybersprint.com/blog/looking-back-on-the-2021-vulnerability-log4shell" title="" class="hs-featured-image-link"> <img src="https://www.cybersprint.com/hubfs/Log4Shell.png" alt="Looking back on the 2021 vulnerability: Log4shell" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>In December 2021 a critical vulnerability surfaced named Log4shell within Log4j, a widely used logging tool for java applications. Log4j is used globally by computers running online services, which meant it impacted a multitude of people, organisations, and government organisations. Since then, <a href="https://logging.apache.org/log4j/2.x/security.html">multiple fixes</a> have been implemented in the hope to avoid such an outbreak in the future.</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=5479065&amp;k=14&amp;r=https%3A%2F%2Fwww.cybersprint.com%2Fblog%2Flooking-back-on-the-2021-vulnerability-log4shell&amp;bu=https%253A%252F%252Fwww.cybersprint.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Use case Thu, 21 Apr 2022 12:25:53 GMT n.engelbrecht@cybersprint.com (Netania Engelbrecht) https://www.cybersprint.com/blog/looking-back-on-the-2021-vulnerability-log4shell 2022-04-21T12:25:53Z