Blogs.

Read our blogs for the latest cyber security updates.
Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

Empowering security: the battle against Login Spoofing

Introduction Battling cyber-crime can sometimes feel like an endless tennis...

Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

A Conti-nuous issue

Introduction In this blog, we shed light on our findings during a forensic...

A case of ransomware, resolved

...

How we discovered outdated Windows Servers

Introduction Managing servers is the process of taking care of computer systems...

The story of a real vishing attack: detailed incident walkthrough

Introduction In this article, we'll cover the following: Context on vishing...

Microsoft Teams Chat: the rising phishing threat and how to stop it

Introduction Around mid-September, our Security Operations Centre (SOC)...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

Security Alert: Critical Vulnerability GeoServer

We want to bring your attention to a critical vulnerability in GeoServer that...

1 2

Are you ready to get started?

See how affordable complete protection can be for you