Contact us
Request demo →
Contact us
search
close

Using Telegram monitoring to enhance your attack surface management

For several years illicit actors have been switching from the dark web to Telegram. One of the reasons for this change is that several dark web forums have been shut down by law enforcement. With fewer marketplaces to offer their goods and services, online criminals were forced to look for new platforms to reach their customers.

read more

International Women's Day 2022

As today is International Women’s Day, we would like to celebrate the women that work across all departments at Cybersprint. We would like to introduce some of them to you:

read more

5 lessons learnt from 2021's vulnerabilities

2021 saw some major cyber hacks, incidents, and digital risks. From Exchange to Log4j, and everything in between. Many of these incidents happened because of vulnerabilities in systems, software, or procedures that threat actors might have been able to abuse.

read more

How to find and mitigate the recent WordPress CVE-2022-21661

A few days ago, WordPress released a patch for their software. This patch updates WordPress to version 5.8.3, and addresses four vulnerabilities. Three of these vulnerabilities have been rated as ‘high importance’ with two CVSS scores of 8.0, a 7.4, and a 6.6, as they allow for different kinds of attacks. This article explains how the different vulnerabilities could be abused, and how we were able to find the relevant WordPress software to check for risks.

read more

Defend yourself against a coming wave of API cyberattacks

APIs (Application Programming Interfaces) are used by countless businesses. By defining the rules that programmers must follow to interact with a programming language or software tool, they play a key role in enabling organisations to connect with services and transfer data.

read more

Log4j vulnerability: the timeline & security recommendations

Last Thursday, a critical vulnerability in Apache log4j was published. Log4j is a software component, meaning that it integrates with a lot of Java applications: it is their most commonly used logging framework. It’s used in thousands of different applications, leading to systems at risk on a largely unprecedented scale.

read more

Open Directories: A Peek Into Our Research

In our previous blog, we explained what open directories are and how they can result in a data leak. As mentioned there, we conducted research into the risks of open directories ourselves, to see the extent of the problem. We’ll go into the method and preliminary results of that research here, while leaving the most telling examples and conclusions for our webinar on Wednesday 1 December.

read more

Open Directories: how does it work and what is the risk?

Open directories are like online file storing systems to access files remotely. A directory works like a digital filing cabinet, organising folders and files such as invoices, back-ups, important mail, IP, and more. Having this operate via the cloud means you can access your files from anywhere. However, some directories lack security, also known as open directories, and are accessible to more people than you would like.

read more

Diving into the cookie jar: why cookies are used and how to set them

Cookie settings, cookie banners, cookie consent… You are asked to review and agree with a website’s cookie settings whenever you visit it for the first time. Some of that data is necessary or anonymous, some is not. And it’s not always easy to set up and manage, as we’ve recently experienced ourselves. This blog aims to clarify the different cookie settings and regulations, hopefully helping you to tackle similar challenges. What exactly do you need to keep in mind when managing your website’s cookie settings?

read more

Do you have a question?

Our experts have the answers

Contact us