Blogs.
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
Product Update: Demo Portal
In this blog, we sit down with Anne Postma, our Product Manager, to discuss the...
Product Update: Vulnerability & Threat Hunting
In this blog, we interview Robbin Begeer, Product Manager at Eye Security,...
CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 30th at 00:00 CEST In this blog, we provided real-time...
Empowering security: the battle against Login Spoofing
Introduction Battling cyber-crime can sometimes feel like an endless tennis...
How Microsoft might have lured unsuspecting end-users into the hands of criminals
...
A Conti-nuous issue
Introduction In this blog, we shed light on our findings during a forensic...
A case of ransomware, resolved
...
How we discovered outdated Windows Servers
Introduction Managing servers is the process of taking care of computer systems...
The story of a real vishing attack: detailed incident walkthrough
Introduction In this article, we'll cover the following: Context on vishing...
Microsoft Teams Phishing: How to Stop The Rising Phishing Threat
Introduction Around mid-September, our Security Operations Centre (SOC)...