Blogs.

Read our blogs for the latest cyber security updates.

NIS2: How the New EU Cyber Law Protects Your Business

Cyber attacks are now big business – but they’re impacting smaller companies....

NIS2 EU: Top 3 Cyber Laws and Their High-Level Definitions

Cybersecurity compliance can seem daunting. With so many new regulations coming...

Empowering security: the battle against Login Spoofing

Introduction Battling cyber-crime can sometimes feel like an endless tennis...

People threat hunting

“Master” Malware - a new C2 framework

Introduction Recently, during an incident response engagement, we came across a...

Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

A Conti-nuous issue

Introduction In this blog, we shed light on our findings during a forensic...

A case of ransomware, resolved

...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration

Logistics cybersecurity in 2024: Hello new growth! Hello new risks...

Sustainability. Growth. Digitalisation. These are the words everyone's using...

Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit

How to defend against EvilProxy when a phishing attack strikes

Context Here at Eye Security, we have observed a disturbing increase in...

windows screen

How we discovered outdated Windows Servers

Introduction Managing servers is the process of taking care of computer systems...

Are you ready to get started?

See how affordable complete protection can be for you