Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

8 Tips om een veilig wachtwoord te makenBlog
24 November 2022

8 Tips for creating a secure password

24 November is ‘National Check Your Passwords Day. This day was created by Tweakers several years ago. Unfortunately it still is necessary to bring attention to strong passwords and proper…
Tesorion Vulnerability Explorer powered by EPSS – Blog2BlogCERT
22 September 2022

Tesorion Vulnerability Explorer powered by EPSS – 2

In part 1 of this blog, we introduced the Tesorion Vulnerability Explorer and provided background information on the Exploit Prediction Scoring System (EPSS). In this blog we take a deep…
BlogCERT
15 September 2022

Tesorion Vulnerability Explorer powered by EPSS

During incident response cases, determining how an adversary gained access to the IT infrastructure is not always as clear cut as “It was colonel Mustard in the remote access VPN…
BlogVulnerability
8 April 2022

Spring Framework vulnerabilities

This live blog contains information regarding Spring Framework vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
BlogCERTSOCVulnerability
2 April 2022

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be…
Blog
21 March 2022

Lorenz ransomware rebound: corruption and irrecoverable files

In July 2021, we came across the Lorenz ransomware. Lorenz is a ransomware strain that targets organizations, demanding hundreds of thousands of dollars in ransom. In our analysis in 2021…
Read more blogs
News
17 November 2022

Tesorion and Ploum enter partnership regarding cyber security advisory

Full-service law firm Ploum and cyber security service provider Tesorion have entered a strategic partnership. Ploum and Tesorion’s shared ambition is to make and keep organizations cyber secure. For this…
News
13 October 2022

Tesorion develops Vulnerability Explorer for Incident Response Teams

Software assigns priority to probability of exploitation of vulnerabilities Leusden, 13 October 2022 – Tesorion, the largest, 100 percent Dutch, independent cyber security service provider, has developed software for Incident Response Teams.…
News
8 September 2022

Tesorion chooses strategic partnership with Cybereason

Quick insight and adequate performance key in battle against cybercrime With the strategic partnership between Cybereason and Tesorion, Tesorion is taking the next step in realizing its growth strategy. Tesorion,…
News
29 June 2022

Tesorion announces partnership with KLDiscovery Ontrack for data recovery and eDiscovery

Data recovery essential to return to normal operations after a cyber incident as soon as possible Tesorion, the largest, 100% Dutch, independent cyber security service provider announces a partnership with…
News
7 January 2022

Compumatica appoints Pasqualle Verwoedt as CCO

Starting from the 1st of January Pasqualle Verwoerdt, previous Chief Sales Officer at Kahuna, is appointed as the new Chief Commercial Officer at Compumatica. Begin 2021, Tesorion joined forces with…
News
3 January 2022

Information for Kahuna Customers

In the summer of 2021 we informed you about the acquisition of Kahuna by Tesorion. We would like to inform you about the progress of the integration of Kahuna into the…
Read more news
Vulnerability
30 November 2022

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
ExchangeCERTSOCVulnerability
10 November 2022

ProxyNotShell Vulnerability

This live blog contains information regarding the ProxyNotShell vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
Kwetsbaarheden in Citrix Gateway en ADCCERTSOCVulnerability
10 November 2022

Multiple vulnerabilities in Citrix Gateway and ADC

This live blog contains information regarding multiple vulnerabilities in Citrix Gateway and ADC. As soon as we have an update, we’ll add it to this post. More information about possible…
Juniper kwetsbaarheidCERTSOCVulnerability
31 October 2022

Junos J-Web vulnerabilities

This live blog contains information regarding the Junos J-Web vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
ApacheCERTSOCVulnerability
27 October 2022

Apache Commons Text vulnerability

This live blog contains information regarding the Apache Commons Text vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
proxyCERTSOCVulnerability
21 October 2022

ProxyRelay Vulnerability

This live blog contains information regarding the ProxyRelay vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources