-
Sustainability. Growth. Digitalisation. These are the words everyone’s using about the logistics landscape of 2023. But what do they mean for individual businesses – and for security?
-
Multi-Factor Authentication (MFA) is not sufficient. Various attacks, such as EvilProxy, can bypass MFA. Here, we discuss how you can defend yourself.
-
Software and operating systems are constantly evolving. Those that are no longer maintained - such as Window Server - may be hiding unmitigated security vulnerabilities within your business. Proactively assessing your infrastructure strengthens your security posture and your resilience against cyber threats.
-
Vishing attacks (voice phishing attacks) are getting more sophisticated. In this article, we cover the details of a real vishing attack that we prevented. Includes digital forensics, incident response, mitigation and prevention measures and IoC lists.
-
Microsoft Teams Chat is being exploited for phishing attacks. In this blog, we share why Microsoft Teams Chat is being targeted, how to respond to and mitigate these cyber attacks and how your IT team can prevent similar cyber attacks from happening in the future.
-
Entrepreneurship is inherently associated with taking risks, and the digital world is full of them. Learn what is Risk Intelligence and how can it help protect your business.
-
Our blog series showcases specific hunts, including identifying unnecessary RDP access, monitoring Bitlocker usage for ransomware attacks, and exploring the impact of malicious advertisements.
-
Employee absenteeism is rising among IT managers and employees, as are burnout rates in this professional category. So how can we bring cybersecurity to management's attention and take the proper measures?
-
A critical vulnerability in GeoServer has become relevant again. The vulnerability poses a significant risk to organisations. Read more in our blog.
-
Read our blog post about the impact of the new 'cybersecurity' directive, NIS2, on insurers.
-
The insurance market is now aware that cyber risk is difficult to manage and therefore difficult to insure. Read more in our blog.
-
Read our blog post about the impact of the new 'cybersecurity' directive, NIS2, on insurers.
-
Discover why cyber insurance is essential for comprehensive risk management in our interview with Arjan Halma, Managing Director Eye Underwriting.
-
Our cyber experts have analysed over eleven thousand alerts from the past year. In this blog, we share the results of this analysis. Read more.
-
Improve your digital security in the new year with these cybersecurity resolutions. Protect your business from the growing threat of cyberattacks in 2023.
-
An antivirus programme alone will not protect your company against cybercrime. Read more
-
Security Specialists from Eye Security have observed a rather large phishing campaign using a few interesting tactics that we would like to share.
-
On the 10th of May, our Security Operation Centre got an alert about a blocked Powershell execution on one of our new customer's exchange servers.
-
Sending a phishing email has a high chance of success, especially with new employees. Read our tips.
-
Discover how attackers are actively exploiting a remote code execution vulnerability found in the logging package log4j2 used in most Java applications.
-
It is important to ensure that your company data is safe and secure. Minimise the risks with these five free tips.
-
Machine learning makes an important contribution to cybersecurity by recognising patterns and thus detecting and preventing possible attacks.
-
Find out how cyber criminals use social engineering practices, with the goal of tricking employees into revealing important and sensitive information.
-
A zero day is an unresolved vulnerability in software. It can act as an unsealed gateway for cyber criminals to infiltrate corporate networks.
-
A common misconception is that not much can be done to combat ransomware attacks. Discover the methods used to deal with and prevent these attacks on time.
-
Find out, through a specific case study, how cyberattacks can lead to liability conflicts between parties and a few tips on how to avoid these situations.
-
With numerous SMEs still disregarding the importance of a strong security system, here are a few steps on how to start creating a digitally secure base.
-
The ABUS Secvest wireless system is implemented by consumers and businesses. Discover how the vulnerability could be hacked or deactivated remotely.
-
Hackers are gradually becoming more sophisticated with their practices. Discover how Eye dealt with a ransomware attack from a certain "data doctor".
-
If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX, you should update to the latest version. Find the list of affected devices on our blog.