Blogs.
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
“Master” Malware - a new C2 framework
Introduction Recently, during an incident response engagement, we came across a...
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
A case of ransomware, resolved
...
Cyber in logistics 2023: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone’s using...
How Eye Security can defend you against EvilProxies
Context Here at Eye Security, we have observed a disturbing increase in...
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...
Microsoft Teams Chat: the rising phishing threat and how to stop it
Introduction Around mid-September, our Security Operations Centre (SOC)...