Blogs.
Sneaky2FA: Use This KQL Query to Stay Ahead of the Emerging Threat
At Eye Security, we constantly seek out new threats and detection methods to...
Cybersecurity for Manufacturing: What Are the Challenges?
Manufacturing companies form the very foundation of the global economy....
8Base Ransomware Recovery: Key and File Retrieval
The Eye Security Incident Response team was recently engaged to investigate a...
EDR vs NDR: Why Endpoint Security Has a Clear Advantage
Choosing the right cybersecurity tools can be challenging in a crowded...
8Base Ransomware Investigation Uncovers Surprising Insights
Almost every engagement of the Eye Security Incident Response team provides new...
Business Email Compromise: Fifteen Steps to Reduce the Risk
Business email compromise (BEC) is a concept that first appeared around 2013...
A new paradigm to extinguish cyber risk for good: 24/7 protection connects with cyber insurance
...
Eliminating cyber risk for your clients together
Businesses built on partnership In the relatively short time we’ve been in...
Product Update: Demo Portal
In this blog, we sit down with Anne Postma, our Product Manager, to discuss the...
Product Update: Vulnerability & Threat Hunting
In this blog, we interview Robbin Begeer, Product Manager at Eye Security,...
CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 30th at 00:00 CEST In this blog, we provided real-time...
NIS2 Directive Overview: In-depth look at Articles 21 and 23
While many EU countries are still working out the specifics of implementing the...
NIS2: How the New EU Cyber Law Protects Your Business
Cyber attacks are now big business – but they’re impacting smaller companies....
NIS2 EU: Top 3 Cyber Laws and Their High-Level Definitions
Cybersecurity compliance can seem daunting. With so many new regulations coming...
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
“Master” Malware - a new C2 framework
Introduction Recently, during an incident response engagement, we came across a...
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
A case of ransomware, resolved
...
Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...
How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...
Microsoft Teams Phishing: How to Stop The Rising Phishing Threat
Introduction Around mid-September, our Security Operations Centre (SOC)...
Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...
Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...
The silent crisis: IT burnout due to increased cybercrime
Employee absenteeism is rising among IT managers and employees, as are burnout...
Security Alert: Critical Geoserver Vulnerabilities
We want to bring your attention to a critical vulnerability in GeoServer that...
NIS2: how will it be transposed in European countries?
The NIS2 Directive is the latest European cybersecurity regulation, aiming to...
When it comes to cybersecurity, insurers set the bar high
The insurance market is now aware that cyber risk is difficult to manage and...
European Union working on new security directive
The impact of the new 'cybersecurity' directive, NIS2, on insurers Although the...
Cyber insurance: your safety net in an increasingly risky world
To minimise the impact of a cyber incident, preventive security measures must...
What are the chances of being hacked? Eye Security: 1 in 5
In recent years, we have seen an increasing number of cyber attacks on...
6 Cybersecurity Resolutions for 2023 – And How to Implement Them
The new year is a good opportunity for companies to break bad habits -- such as...
Antivirus is not enough to protect your business - here is why
Many antivirus software providers claim that their product will protect you...
Large scale phishing campaign quickly utilises Legacy Authentication before Microsoft disables it
Security Specialists from Eye Security have observed a rather large phishing...
WinRS and Exchange, a sneaky backdoor
How it started ? On the 10th of May around lunch, our Security Operation Centre...
Are new employees the weakest link in your organisation?
We have all been there: starting a new job can be very overwhelming. There are...
Log4j Critical Updates by Eye CERT
Introduction Attackers are actively exploiting a remote code execution...
5 tips to secure your company for free
No matter how big or small your company is, everyone has crown jewels: crucial...
How does machine learning in cybersecurity help detect threats?
Machine learning makes an important contribution to cybersecurity by...
What is social engineering and how do I protect my company against it?
Social engineering is the temptation of people to reveal sensitive information...
What is a Zero Day? How to Ensure Zero Day Protection for Your Company
A zero day is an unresolved vulnerability in software that puts end users at...
You can protect yourself against supply chain ransomware – here's how
Still in shock, the media is suggesting that there is little that can be done...
Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...
What you want to know from your IT supplier in the field of security
Within SMEs there is still the impression that they are not of interest to...
Breaking ABUS Secvest internet-connected alarm systems (CVE-2020-28973)
ABUS Secvest is a wireless alarm system that is marketed at consumers and small...
We help Hospitals - Together against Corona
Introduction NATO, Red Cross, UN and Interpol warned in March 2020 about...
When the data doctor makes you ill (but we decrypt his ransomware)
What happened? Recently, we were contacted by Aon Nederland Cyber Solutions,...
Undocumented user account in Zyxel products (CVE-2020-29583)
TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...