Get in Touch Close Menu
Legacy Antivirus vs EDR: What’s the Difference? | Sapphire
6 July 2021

For protecting endpoints such as workstations and servers, antivirus protection has been the traditional go-to. However, with Endpoint Protection and Response (EDR), next-generation protection is available to organisations.

find out more
‘PrintNightmare’- July 2021
2 July 2021

On June 8th, 2021, Microsoft released their scheduled weekly security update; contained within this release was a patch for a Print Spooler service (spoolsv.exe) vulnerability CVE-2021-1675. The vulnerability had initially been deemed a low-risk Escalation of Privilege (EoP) exploit. However, Microsoft unexpectedly upgraded it to a high-risk Remote Code Execution vulnerability that would allow authenticated […]

Find out more
A Guide to Web Application Pen Testing | Sapphire
30 June 2021

Over the last year, the technological landscape has changed dramatically across the globe. More businesses than ever are investing in large and robust infrastructures, but the unfortunate truth is severe, and high-level cybersecurity weaknesses are more common today in 2021 than in 2020.

Find out more
How to Secure a Website – 8 Tips for Success | Sapphire
10 June 2021

Frequently, websites have outdated software containing known security vulnerabilities this is a security risk that can be avoided. Carrying out regular software updates and ensuring that you are using the latest version of the software will typically remediate these issues by installing security patches and increasing your website security.

Find out more
NOBELIUM Phishing Campaign | Sapphire
9 June 2021

On May 27th, the Microsoft Threat Intelligence Centre (MSTIC) announced that ‘NOBELIUM’, the threat actor behind the SolarWinds compromise, had instigated another attack in the form of a persistent and evolving phishing campaign. Conducted in increasingly complex stages, this campaign has been active since January 2021. This is since the MSTIC first became aware of the operation.

Find out more
Security Operations Centre Best Practices
21 May 2021

A Security Operations Centre (SOC) is a service that is used to monitor, detect, and respond to security incidents and events across an organisation’s infrastructure. Cyber-attacks and data breaches, organisations, companies, are an inevitable part of our digital world and enterprises of all sizes need to place emphasis on their ability to detect and respond […]

Find out more
HSE Conti Ransomware Attack
18 May 2021

In the early hours of May 14th it was revealed that a sophisticated ransomware attack had taken place against the IT systems of the Irish Health Service Executive (HSE). Information is still coming to light, but it is known that a human-operated, externally based threat group deployed a variant of the ‘Conti’ ransomware this ransomware […]

Find out more
CRING RANSOMWARE
22 April 2021

In April, Sapphire threat intelligence resources identified a sophisticated ransomware campaign utilising the Cring malware and leveraging vulnerability (CVE-2018-13379), identified in 2019 affecting Fortinet VPN Servers. This allows a threat actor to connect to the VPN appliance with no authentication and download session files containing usernames and passwords in clear text. Though this vulnerability has […]

Find out more
Vulnerability Assessment Vs Penetration Testing
10 April 2021

To protect your business from hackers, it is essential to know what level of risk your business is at. It must then be decided whether a penetration test or a vulnerability assessment is appropriate for you. It is important to know the difference between the two and the varying levels of security that they provide […]

Find out more
Critical Vulnerabilities Cisco SD-WAN
7 April 2021

Cisco has publicly disclosed several critical vulnerabilities affecting their Software Defined WAN (SD-WAN) products. A total of eight vulnerabilities were revealed. Each were identified with a CVSS rating of 9.6 or more, indicating a critical vulnerability which required immediate remediation. The SD-WAN vulnerabilities can be grouped by the method in which they exploit the weakness […]

Find out more
Microsoft Netlogon Vulnerability CVE-2020-1472
6 April 2021

In September 2020 details of a critical vulnerability known as ‘ZeroLogon’ were published. This vulnerability affects Windows NetLogon processes and referenced as CVE-2020-1472. The publication coincided with the August 2020 Windows Security Update release, which addressed this vulnerability before it became widely known and distributed among threat actors. Since its announcement, proof-of-concept exploits have been […]

Find out more
Microsoft Defender Zero-day CVE-2021-1647
5 April 2021

On the 12th of January 2021, Microsoft released the first cumulative patch of the new year, with eighty-three security vulnerabilities rectified across a range of Microsoft products. The most significant of these fixes related to a zero-day vulnerability within Microsoft Defender, the integrated anti-virus of Windows operating systems. This vulnerability is being tracked and identified as CVE-2021-1647 and described […]

Find out more