Blogs.

Read our blogs for the latest cyber security updates.
real vishing attack

The story of a real vishing attack: detailed incident walkthrough

Introduction In this article, we'll cover the following: Context on vishing...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

Security Alert: Critical Geoserver Vulnerabilities

We want to bring your attention to a critical vulnerability in GeoServer that...

featured-image

What is the chance of getting hacked? Eye Security: 1 in 5

In recent years, we have seen an increasing number of cyber attacks on...

featured-image

6 Cybersecurity Resolutions for 2023 – And How to Implement Them

The new year is a good opportunity for companies to break bad habits -- such as...

Large scale phishing campaign quickly utilises Legacy Authentication before Microsoft disables it

Security Specialists from Eye Security have observed a rather large phishing...

featured-image

WinRS and Exchange, a sneaky backdoor

How it started ? On the 10th of May around lunch, our Security Operation Centre...

featured-image

Are new employees the weakest link in your organisation?

We have all been there: starting a new job can be very overwhelming. There are...

featured-image

Log4j Critical Updates by Eye CERT

Introduction Attackers are actively exploiting a remote code execution...

Are you ready to get started?

See how affordable complete protection can be for you