Blogs.

Read our blogs for the latest cyber security updates.
free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

cyber threats report 2026

The Cyber Threat Landscape 2026: Building Resilience, Acting Fast

Cyber defence is entering a race measured in minutes, not days. As we move into...

free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

Remote code execution via Microsoft’s Windows Update Health Tools

For readers who want the full technical analysis, the detailed research blog is...

business email compromise case

When Business Email Compromise Nearly Costs a Million: An Incident Response Story

Business Email Compromise (BEC) remains one of the most damaging yet...

Dual-Use-KI in die Cybersicherheit

Dual-use AI in Cyberattacks: How LLMs Are Reshaping the Threat Landscape

The malicious use of AI is evolving, making attacker tactics increasingly...

avoiding a ransomware attack in logistics

Hours from shutdown: How a Logistics company escaped ransomware just in time

This is a real incident Eye Security investigated at Move Intermodal. The...

SharePoint under siege

Eye Security Uncovers Actively Exploited Zero-Day in Microsoft SharePoint (CVE-2025-53770)

On the evening of July 18, 2025, Eye Security identified active, large-scale...

incident response

Inside a Ransomware Attack: What a Real-World Incident Can Teach Us

“All systems went dark. We are locked out of everything. We don’t know how far...

cyberattacks attacks on retail

Retail Giants Breached: What the M&S, Harrods & UNFI Attacks Mean for Your Cyber Defences

A surge of high-impact cyberattacks is shaking the retail sector, exposing...

SNEAKY 2FA protecting against the threat

Sneaky 2FA: Use This KQL Query to Stay Ahead of the Emerging Threat

At Eye Security, we constantly seek out new threats and detection methods to...

1 2 3 4

Are you ready to get started?

See how affordable complete protection can be for you