Blogs.

Read our blogs for the latest cyber security updates.

Large scale phishing campaign quickly utilises Legacy Authentication before Microsoft disables it

Security Specialists from Eye Security have observed a rather large phishing...

featured-image

WinRS and Exchange, a sneaky backdoor

How it started ? On the 10th of May around lunch, our Security Operation Centre...

featured-image

Are new employees the weakest link in your organisation?

We have all been there: starting a new job can be very overwhelming. There are...

featured-image

Log4j Critical Updates by Eye CERT

Introduction Attackers are actively exploiting a remote code execution...

featured-image

5 tips to secure your company for free

No matter how big or small your company is, everyone has crown jewels: crucial...

featured-image

How does machine learning in cybersecurity help detect threats?

Machine learning makes an important contribution to cybersecurity by...

featured-image

What is social engineering and how do I protect my company against it?

Social engineering is the temptation of people to reveal sensitive information...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
featured-image

What is a Zero Day? How to Ensure Zero Day Protection for Your Company

A zero day is an unresolved vulnerability in software that puts end users at...

featured-image

You can protect yourself against supply chain ransomware – here's how

Still in shock, the media is suggesting that there is little that can be done...

featured-image

Who is responsible for the damage in a cyber attack?

In 2021, the Central Netherlands court made a striking decision. Bol.com and...

Are you ready to get started?

See how affordable complete protection can be for you