Blogs.
NIS2: How the New EU Cyber Law Protects Your Business
Cyber attacks are now big business – but they’re impacting smaller companies....
NIS2 EU: Top 3 Cyber Laws and Their High-Level Definitions
Cybersecurity compliance can seem daunting. With so many new regulations coming...
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
“Master” Malware - a new C2 framework
Introduction Recently, during an incident response engagement, we came across a...
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
A case of ransomware, resolved
...
Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...
How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...