Blogs.
Large scale phishing campaign quickly utilises Legacy Authentication before Microsoft disables it
Security Specialists from Eye Security have observed a rather large phishing...
WinRS and Exchange, a sneaky backdoor
How it started ? On the 10th of May around lunch, our Security Operation Centre...
Are new employees the weakest link in your organisation?
We have all been there: starting a new job can be very overwhelming. There are...
What is social engineering and how do I protect my company against it?
Social engineering is the temptation of people to reveal sensitive information...
What is a zero day and how do I protect my company against it?
A zero day is an unresolved vulnerability in software that puts end users at...
You can protect yourself against supply chain ransomware – here's how
Still in shock, the media is suggesting that there is little that can be done...
Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...
Breaking ABUS Secvest internet-connected alarm systems (CVE-2020-28973)
ABUS Secvest is a wireless alarm system that is marketed at consumers and small...
When the data doctor makes you ill (but we decrypt his ransomware)
What happened? Recently, we were contacted by Aon Nederland Cyber Solutions,...
Undocumented user account in Zyxel products (CVE-2020-29583)
TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...