Blogs.

Log4j Critical Updates by Eye CERT
Introduction Attackers are actively exploiting a remote code execution...


5 tips to secure your company for free
No matter how big or small your company is, everyone has crown jewels: crucial...


How does machine learning in cybersecurity help detect threats?
Machine learning makes an important contribution to cybersecurity by...


What is social engineering and how do I protect my company against it?
Social engineering is the temptation of people to reveal sensitive information...


What is a Zero Day? How to Ensure Zero Day Protection for Your Company
A zero day is an unresolved vulnerability in software that puts end users at...


You can protect yourself against supply chain ransomware – here's how
Still in shock, the media is suggesting that there is little that can be done...


Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...


Breaking ABUS Secvest internet-connected alarm systems (CVE-2020-28973)
ABUS Secvest is a wireless alarm system that is marketed at consumers and small...


When the data doctor makes you ill (but we decrypt his ransomware)
What happened? Recently, we were contacted by Aon Nederland Cyber Solutions,...


Undocumented user account in Zyxel products (CVE-2020-29583)
TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...
