Blogs.
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/8.jpg?width=800&name=8.jpg)
How does machine learning in cybersecurity help detect threats?
Machine learning makes an important contribution to cybersecurity by...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/14.jpg?width=800&name=14.jpg)
What is social engineering and how do I protect my company against it?
Social engineering is the temptation of people to reveal sensitive information...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/1.jpg?width=800&name=1.jpg)
What is a zero day and how do I protect my company against it?
A zero day is an unresolved vulnerability in software that puts end users at...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/4.jpg?width=800&name=4.jpg)
You can protect yourself against supply chain ransomware – here's how
Still in shock, the media is suggesting that there is little that can be done...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/14.jpg?width=800&name=14.jpg)
Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/5.jpg?width=800&name=5.jpg)
What you want to know from your IT supplier in the field of security
Within SMEs there is still the impression that they are not of interest to...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/9.jpg?width=800&name=9.jpg)
Breaking ABUS Secvest internet-connected alarm systems (CVE-2020-28973)
ABUS Secvest is a wireless alarm system that is marketed at consumers and small...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/1.jpg?width=800&name=1.jpg)
We help Hospitals - Together against Corona
Introduction NATO, Red Cross, UN and Interpol warned in March 2020 about...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Job%20Kuijpers.jpg)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/9.jpg?width=800&name=9.jpg)
When the data doctor makes you ill (but we decrypt his ransomware)
What happened? Recently, we were contacted by Aon Nederland Cyber Solutions,...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/5.jpg?width=800&name=5.jpg)
Undocumented user account in Zyxel products (CVE-2020-29583)
TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Jotter%20Sonneveld.jpg)