Blogs.
![Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit](https://www.eye.security/hubfs/Eye%20Security%20Bypassing%20MFA%20A%20Forensic%20Look%20At%20Evilginx2%20Phishing%20Kit.png)
How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Koen%20Meeuwisse.jpg)
![](https://www.eye.security/hubfs/Windows.jpg)
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Finn%20van%20der%20Knaap.jpg)
![](https://www.eye.security/hubfs/rene-ranisch-g9eOS9xL-jE-unsplash.jpg)
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![](https://www.eye.security/hubfs/image-20230915-133415-1.png)
Microsoft Teams Chat: the rising phishing threat and how to stop it
Introduction Around mid-September, our Security Operations Centre (SOC)...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/6.jpg?width=800&name=6.jpg)
Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/6.jpg?width=800&name=6.jpg)
Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/15.jpg?width=800&name=15.jpg)
The silent crisis: IT burnout due to increased cybercrime
Employee absenteeism is rising among IT managers and employees, as are burnout...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/7.jpg?width=800&name=7.jpg)
Security Alert: Critical Vulnerability GeoServer
We want to bring your attention to a critical vulnerability in GeoServer that...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Piet%20Kerkhofs.jpg)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/4.jpg?width=800&name=4.jpg)
NIS2: how will it be transposed in European countries?
The NIS2 Directive is the latest European cybersecurity regulation, aiming to...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/8.jpg?width=800&name=8.jpg)
When it comes to cybersecurity, insurers set the bar high
The insurance market is now aware that cyber risk is difficult to manage and...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Arjan%20Halma.jpg)