Blogs.

Read our blogs for the latest cyber security updates.
Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit

How to defend against EvilProxy when a phishing attack strikes

Here at Eye Security, we have observed a disturbing increase in security...

windows screen

How we discovered outdated Windows Servers

Introduction Managing servers is the process of taking care of computer systems...

real vishing attack

The story of a real vishing attack: detailed incident walkthrough

Introduction In this article, we'll cover the following: Context on vishing...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

Security Alert: Critical Geoserver Vulnerabilities

We want to bring your attention to a critical vulnerability in GeoServer that...

featured-image

What is the chance of getting hacked? Eye Security: 1 in 5

In recent years, we have seen an increasing number of cyber attacks on...

featured-image

6 Cybersecurity Resolutions for 2023 – And How to Implement Them

The new year is a good opportunity for companies to break bad habits -- such as...

Large scale phishing campaign quickly utilises Legacy Authentication before Microsoft disables it

Security Specialists from Eye Security have observed a rather large phishing...

featured-image

WinRS and Exchange, a sneaky backdoor

How it started ? On the 10th of May around lunch, our Security Operation Centre...

Are you ready to get started?

See how affordable complete protection can be for you