Blogs.
Read our blogs for the latest cyber security updates.
Filter
#}
Search

3 min read
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...

By:
Vaisha Bernard

4 min read
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...

By:
Tjeerd Legué

1 min read
A case of ransomware, resolved
...

By:
Eye Security

4 min read
Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...

By:
Eye Security

12 min read
How to defend against EvilProxy when a phishing attack strikes
Here at Eye Security, we have observed a disturbing increase in security...

By:
Koen Meeuwisse

3 min read
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
By:
Finn van der Knaap

8 min read
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...

By:
Rik Dolfing

9 min read
Microsoft Teams Phishing: How to Stop The Rising Phishing Threat
Introduction Around mid-September, our Security Operations Centre (SOC)...

By:
Eye Security

3 min read
Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...

By:
Jotte Sonneveld

5 min read
Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...

By:
Rik Dolfing