Blogs.

Read our blogs for the latest cyber security updates.

A Conti-nuous issue

Introduction In this blog, we shed light on our findings during a forensic...

A case of ransomware, resolved

...

Logistics cybersecurity in 2024: Hello new growth! Hello new risks...

Sustainability. Growth. Digitalisation. These are the words everyone's using...

Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit

How to defend against EvilProxy when a phishing attack strikes

Context Here at Eye Security, we have observed a disturbing increase in...

windows screen

How we discovered outdated Windows Servers

Introduction Managing servers is the process of taking care of computer systems...

The story of a real vishing attack: detailed incident walkthrough

Introduction In this article, we'll cover the following: Context on vishing...

Microsoft Teams Phishing: How to Stop The Rising Phishing Threat

Introduction Around mid-September, our Security Operations Centre (SOC)...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

The silent crisis: IT burnout due to increased cybercrime

Employee absenteeism is rising among IT managers and employees, as are burnout...

Are you ready to get started?

See how affordable complete protection can be for you