Pen Testing
Man using Macbook

What is a White Hat Hacker?

The term “hacker” often strikes people with feelings of fear. This is due to the word being widely used to describe someone with malicious intentions who are looking to steal information and/or money from innocent people and businesses. However, for those working in the cybersecurity industry, a “hacker” doesn’t always have negative connotations. So, what […]

Pen Testing
laptop with padlock visual overlaid on world map

What is Penetration Testing and Why Is It Important?

What is Penetration Testing? Penetration testing (also known as pen testing) is a simulated cyber attack carried out by ethical hackers to uncover vulnerabilities that could be exploited by malicious attackers in the future. Why is penetration testing important for businesses? The insights from penetration testing put organisations in a position to make important and […]

Social Engineering
hooded hacker next to female victim

What is Social Engineering? Types & Prevention

Social engineering is the process of criminals manipulating people into performing actions or divulging confidential information to their advantage. Social engineering attacks can be carried out in person, over the phone, or via email. When targeting individuals, the aim is usually to obtain passwords and banking information through tricking users or installing malicious software that […]

News Pen Testing
CyberCrowd Crest Registered

CyberCrowd gains CREST accreditation for pen testing

Berkshire-based cyber security specialist CyberCrowd, has been awarded CREST accreditation for its penetration testing services that simulate real-life cyber attacks to identify vulnerabilities in an organisation’s IT systems. CREST is a not-for-profit body that provides internationally recognised accreditations for organisations providing technical security services that are increasingly required to work for government bodies, financial sector […]


CyberCrowd Board Announcement

Serial Entrepreneur Join Cyber Security Board. Nicola Hartland, creator of industry leading data protection platform iCaaS, joins to complete the new board of ‘one-stop’ digital security firm; CyberCrowd. Following the company’s comprehensive overhaul under Chairman Trevor Rolls and Chief Executive Officer Mike Robinson, the now completed board has already begun work on its ambitious development […]


Impact of an SQL Injection

The OWASP Top 10 is a standard awareness framework for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Number One on the top 10 list of web application vulnerabilities is SQL Injection. A SQL injection attack consists of insertion or “injection” of a SQL […]


SNMP Configured with Default Password

Simple Network Management Protocol (SNMP) is a protocol used for managing devices on the network. It is often overlooked and left in its default condition with the default device community strings. SNMP uses these community stings to access the devices in either read or write mode. If an adversary has access to the open ports […]


The Three C’s – Cookies, Consent and Compliance

The GDPR and ePrivacy standards such as PECR (Privacy and Electronic Communications Regulations) require businesses and organisations to inform visitors about cookies and tracking technologies on their websites and provide users with choice and control over their preferences. However when it comes to cookie compliance there are many myths out there that you can rely on […]