Blogs.
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Eye%20Security_Crowdstrike.jpg)
CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 24th at 08:38 CEST In this blog, we will provide real-time...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Piet%20Kerkhofs.jpg)
![](https://www.eye.security/hubfs/EYE-ARTICLE-BLOG-EN%20%281%29.jpg)
NIS2 Directive Overview: In-depth look at Articles 21 and 23
While many EU countries are still working out the specifics of implementing the...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Koen%20Meeuwisse.jpg)
![](https://www.eye.security/hubfs/NIS2%20blog%20image.jpg)
NIS2: How the New EU Cyber Law Protects Your Business
Cyber attacks are now big business – but they’re impacting smaller companies....
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Marcel%20van%20Asperdt.jpg)
![](https://www.eye.security/hubfs/Images%20NIS2%20Resource%20Hub%20%2810%29.png)
NIS2 and the EU's Top 3 Cyber Laws: High-level Definitions
Cybersecurity compliance can seem daunting. With so many new regulations coming...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Marcel%20van%20Asperdt.jpg)
![](https://www.eye.security/hubfs/Alerts-2.png)
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![People threat hunting](https://www.eye.security/hubfs/8.%20Website%202023/Images/Illustrations/THREAT-HUNTING.jpg)
“Master” Malware - a new C2 framework
Introduction Recently, during an incident response engagement, we came across a...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Tjeerd%20Legue.jpg)
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Eye%20Security_Threat%20Intelligence.jpg)
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Tjeerd%20Legue.jpg)
![](https://www.eye.security/hubfs/marcin-jozwiak-kGoPcmpPT7c-unsplash.jpg)
A case of ransomware, resolved
...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![](https://www.eye.security/hubfs/Screenshot%202023-11-08%20at%2023.32.07.png)
Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)