Blogs.
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Eye%20Security_Crowdstrike.jpg)
CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 24th at 08:38 CEST In this blog, we will provide real-time...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Piet%20Kerkhofs.jpg)
![](https://www.eye.security/hubfs/EYE-ARTICLE-BLOG-EN%20%281%29.jpg)
NIS2 Directive Overview: In-depth look at Articles 21 and 23
While many EU countries are still working out the specifics of implementing the...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Koen%20Meeuwisse.jpg)
![](https://www.eye.security/hubfs/NIS2%20blog%20image.jpg)
NIS2: How the New EU Cyber Law Protects Your Business
Cyber attacks are now big business – but they’re impacting smaller companies....
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Marcel%20van%20Asperdt.jpg)
![](https://www.eye.security/hubfs/Images%20NIS2%20Resource%20Hub%20%2810%29.png)
NIS2 and the EU's Top 3 Cyber Laws: High-level Definitions
Cybersecurity compliance can seem daunting. With so many new regulations coming...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Marcel%20van%20Asperdt.jpg)
![Microsoft Attack Simulation Eye Security person finding vulnerability](https://www.eye.security/hubfs/INTELLIGENCE.jpg)
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Vaisha%20Bernard.jpg)
![](https://www.eye.security/hubfs/Screenshot%202023-11-08%20at%2023.32.07.png)
Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit](https://www.eye.security/hubfs/Eye%20Security%20Bypassing%20MFA%20A%20Forensic%20Look%20At%20Evilginx2%20Phishing%20Kit.png)
How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Koen%20Meeuwisse.jpg)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/4.jpg?width=800&name=4.jpg)
Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/8.jpg?width=800&name=8.jpg)
Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...
![](https://www.eye.security/hubfs/5.%20Eye%20Security%20Branding/Signature/Favicon_90x90_blauw.png)
![featured-image](https://www.eye.security/hs-fs/hubfs/8.%20Website%202023/Images/News%20cards%20images/4.jpg?width=800&name=4.jpg)
When it comes to cybersecurity, insurers set the bar high
The insurance market is now aware that cyber risk is difficult to manage and...
![](https://www.eye.security/hubfs/EYE-HEADSHOT-CROPS_Arjan%20Halma.jpg)