Blogs.

A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...


A case of ransomware, resolved
...


Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...


How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...


How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...

The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...


Microsoft Teams Phishing: How to Stop The Rising Phishing Threat
Introduction Around mid-September, our Security Operations Centre (SOC)...


Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...


Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...


The silent crisis: IT burnout due to increased cybercrime
Employee absenteeism is rising among IT managers and employees, as are burnout...
