Blogs.
Microsoft 365 AitM Phishing Protection: Free Browser Extension
Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...
Insights from the SOC: Why Analysts Still Matter in the Age of AI
Every week, vendors announce new AI tools promising autonomous defence and...
Top Cyber Threats in Logistics and How to Defend Against Them
For decades, transport and logistics operators have focused primarily on...
Uses of AI in Enterprise Cybersecurity: Risks, Opportunities, Strategies
To fully unlock the potential of AI systems in cybersecurity, organisations...
Dual-use AI in Cyberattacks: How LLMs Are Reshaping the Threat Landscape
The malicious use of AI is evolving, making attacker tactics increasingly...
Hours from shutdown: How a Logistics company escaped ransomware just in time
This is a real incident Eye Security investigated at Move Intermodal. The...
Cybersecurity in transportation and logistics: inside the sector’s risks
Over the past five years, cybersecurity incidents have risen 48%, with the...
Eye Security Uncovers Actively Exploited Zero-Day in Microsoft SharePoint (CVE-2025-53770)
On the evening of July 18, 2025, Eye Security identified active, large-scale...
Brute Force Attack on SSLVPN Leads to Stealthy Network Intrusion
Attacks do not always start with malware or flashy exploits. Sometimes, all it...
Retail Giants Breached: What the M&S, Harrods & UNFI Attacks Mean for Your Cyber Defences
A surge of high-impact cyberattacks is shaking the retail sector, exposing...
Top 5 Cyber Threats Manufacturers Face in 2025
Cyber attacks can be devastating to manufacturers. They disrupt supply chains,...
Bas van den Berg