Blogs.
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Eye%20Security_Crowdstrike.jpg)
CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 24th at 08:38 CEST In this blog, we will provide real-time...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Piet%20Kerkhofs.jpg)
![](https://www.eye.security/hubfs/Alerts-2.png)
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![People threat hunting](https://www.eye.security/hubfs/8.%20Website%202023/Images/Illustrations/THREAT-HUNTING.jpg)
“Master” Malware - a new C2 framework
Introduction Recently, during an incident response engagement, we came across a...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Tjeerd%20Legue.jpg)
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Eye%20Security_Threat%20Intelligence.jpg)
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Tjeerd%20Legue.jpg)
![Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit](https://www.eye.security/hubfs/Eye%20Security%20Bypassing%20MFA%20A%20Forensic%20Look%20At%20Evilginx2%20Phishing%20Kit.png)
How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Koen%20Meeuwisse.jpg)
![](https://www.eye.security/hubfs/Windows.jpg)
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Finn%20van%20der%20Knaap.jpg)
![](https://www.eye.security/hubfs/rene-ranisch-g9eOS9xL-jE-unsplash.jpg)
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/15.jpg?width=800&name=15.jpg)
Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/3.jpg?width=800&name=3.jpg)
Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)