Cyberis Blog

Reassuringly clear thinking.

  • Penetration testing
  • Tools and techniques

Common AI Implementation Mistakes to Avoid Part 5

Over the course of four articles, we have explored some of the most common AI implementation mistakes which have been observed during real tests. In this final article, we bring them together and outline the potentially devastating consequences for a business.

Read more
  • Penetration testing
  • Tools and techniques

Common AI Implementation Mistakes to Avoid Part 4

With the exploding use of AI in internal and external applications being rapidly deployed across all sectors, new chatbots, AIs, and versions are being constantly released. Whilst this offers exciting new capabilities, it also widens the potential attack surface of a company’s infrastructure – particularly if updates are not duly applied.

Read more
  • Penetration testing
  • Tools and techniques

Common AI Implementation Mistakes to Avoid Part 3

The use of AI in internal and external applications is rapidly being deployed across all sectors with great alacrity. Whilst this offers exciting new capabilities, it also widens the potential attack surface of a company’s infrastructure. AI chatbots, even with filters, can be tricked into breaking ethical barriers, which could lead to serious consequences.

Read more
  • Penetration testing
  • Tools and techniques

Common AI Implementation Mistakes to Avoid Part 2

The use of AI in internal and external applications is rapidly being deployed across all sectors, often handling vast arrays of data from across an organisation. Whilst this offers exciting new capabilities, it also widens the potential attack surface of a company’s infrastructure. AI infrastructure can accidentally expose sensitive data to unauthenticated users if datasets are not properly configured.

Read more
  • Penetration testing
  • Tools and techniques

Common AI Implementation Mistakes to Avoid Part 1

The use of AI in internal and external applications is rapidly being deployed across all sectors. Whilst this offers exciting new capabilities, it also widens the potential attack surface of a company’s infrastructure. AI chatbots can accidentally expose sensitive data if permissions aren’t properly configured.

Read more
  • News
  • Penetration testing
  • Red teaming
  • Research
  • Tools and techniques

One Identity Secure Password Extension Privilege Escalation (CVE-2025-27582)

Cyberis has discovered a local privilege escalation (LPE) vulnerability - CVE-2025-27582 - in One Identity Secure Password Extension x64 v5.14.3.1, a component of One Identity Password Manager. By abusing the Password Self-Service feature available on the Windows lock screen, an attacker can bypass security restrictions, launch a SYSTEM-privileged print dialog, and ultimately gain a SYSTEM shell. This vulnerability requires only local access and is trivially exploitable in environments where this software is deployed. An attacker can escalate to SYSTEM directly from the logon screen—without requiring valid credentials.

Read more
  • Detect and respond
  • Red teaming
  • Research

Microsoft Bookings – Facilitating Impersonation

Microsoft Bookings introduces a significant security risk by allowing end users to create fully functional Entra accounts without administrative oversight. These accounts, tied to shared Booking pages, can be exploited for impersonation, phishing, and email hijacking. Attackers could leverage this functionality to bypass security measures, gain unauthorised access to sensitive resources, and facilitate lateral movement within an organisation. Our blog explores these weaknesses in detail and provides recommendations for detection and mitigation.

Read more
  • Tools and techniques

Exploiting KeePass CVE-2023-32784

KeePass is a popular open-source password manager which allows users to securely store and manage their passwords in an encrypted database. On May 10 2023 a high risk vulnerability was discovered. This vulnerability allows an attacker with access to the system where KeePass is running to exploit the flaw by analysing a memory dump to extract the master password to the database. The memory dump containing the password can include KeePass process dump, RAM dump of the entire system, hibernation files, or swap files. In this article we will extract the password from KeePass process dump.

Read more

Improve your security

Our experienced team will identify and address your most critical information security concerns.