Blogs.

How Microsoft might have lured unsuspecting end-users into the hands of criminals
...


Eye Security Uncovers Actively Exploited Zero-Day in Microsoft SharePoint (CVE-2025-53770)
On the evening of July 18, 2025, Eye Security identified active, large-scale...


Brute Force Attack on SSLVPN Leads to Stealthy Network Intrusion
Attacks do not always start with malware or flashy exploits. Sometimes, all it...


Inside a Ransomware Attack: What a Real-World Incident Can Teach Us
“All systems went dark. We are locked out of everything. We don’t know how far...


Retail Giants Breached: What the M&S, Harrods & UNFI Attacks Mean for Your Cyber Defences
A surge of high-impact cyberattacks is shaking the retail sector, exposing...


The Eyes Behind Eye Security: Why People Matter in Cyber Security
A message from Piet Kerkhofs, CTO & founder of Eye Security...


Sneaky 2FA: Use This KQL Query to Stay Ahead of the Emerging Threat
At Eye Security, we constantly seek out new threats and detection methods to...


8Base Ransomware Recovery: Key and File Retrieval
The Eye Security Incident Response team was recently engaged to investigate a...


Top 5 Cyber Threats Manufacturers Face in 2025
Cyber attacks can be devastating to manufacturers. They disrupt supply chains,...


Microsoft 365 Credential Theft? Here’s a Free Anti-Phishing to Bolster Your Defences
Credential phishing is a constant threat. And Microsoft 365? Prime target. It's...

Manufacturing and Cybersecurity: What Are the Challenges?
Manufacturing companies form the very foundation of the global economy....
