Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

Hoe gevaarlijk zijn úw ketenpartners? Een aanval op uw bedrijf via ketenpartners. Dat klinkt misschien vreemd, maar deze aanvalsstrategie wordt steeds vaker gebruikt. Wanneer een organisatie zelf niet direct kwetsbaar is, dan wordt er geprobeerd om binnen te komen via de zwakste schakel. In dit artikel kunt u lezen welke gevaren een bedrijf kan lopen wanneer een aanval als deze via ketenpartners plaatsvindt. https://www.tesorion.nl/nl/posts/hoe-gevaarlijk-zijn-uw-ketenpartners/ What risks do your supply chain partners pose? An attack on your business through supply chain partners. It may sound strange, but this attack strategy is becoming more common. When an organization itself is not directly vulnerable, an attempt is made to get in through the weakest link. In this article, you can read about the dangers that a company can face when an attack like this occurs through supply chain partners . https://www.tesorion.nl/en/posts/what-risks-do-your-supply-chain-partners-pose/Blog
27 June 2024

What risks do your supply chain partners pose?

Attacks on organizations by cybercriminals are increasingly often deployed through supply chain partners. This way of attacking is not a recent cyber threat, but it is one that is being…
Blog
27 September 2023

Email: who did not grow up with it

Making an appointment, sending and receiving bills or requesting information. We all still use email for that. Email has come a long way in the past fifty years and has…
dreiging van de quantumcomputerBlog
24 August 2023

The threat of the quantum computer

It is like a race against an invisible opponent. You know he can overtake you. But you do not know when. How can you still win? Host Lex Borger speaks…
Cybersecurity beslaat de hele ketenBlog
21 August 2023

Cybersecurity covers the entire supply chain

It is known that your organization’s digital resilience is as strong as the weakest link. In times of digital transformation and digital supply chain processes being the norm, that weak…
IEC 62443Blog
8 June 2023

IEC 62443: what does it mean for you?

Introduction Nowadays, we are seeing that cyberattacks are increasingly often aimed at industrial environments and critical infrastructure. The impact of these attacks affects primary production processes of organizations and can…
RansomwaregroeperingenBlogCERT
8 June 2023

Ransomware groups and their methods

Companies and organizations are becoming increasingly aware of the danger presented by cybercriminals. The consequences of a cyber incident can be enormous for your business operations and with that, for…
Read more blogs
News
5 October 2023

New management at Dutch cybersecurity specialist Tesorion

LEUSDEN - Tesorion, the leading, 100% Dutch cybersecurity expert, welcomes two new faces to its management team. Aksel Dorèl joins as the new CEO and Stef Kemperink assumes the position…
Samenwerking-Qualys-TesorionNews
13 March 2023

Tesorion announces partnership with Qualys regarding vulnerability management

Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, chooses the cloud-based IT, security and compliance solution by Qualys. The goal is to unburden customers in the area of…
Samenwerking met VectraNews
11 January 2023

Tesorion names Vectra as strategic partner for advanced detection and response

Immediately intervene in threats in Network, Identity and in SaaS and Cloud Environments Leusden – Tesorion, the largest, 100% Dutch, independent cybersecurity service provider, has named Vectra as strategic partner…
Samenwerking met PloumNews
17 November 2022

Tesorion and Ploum enter partnership regarding cyber security advisory

Full-service law firm Ploum and cyber security service provider Tesorion have entered a strategic partnership. Ploum and Tesorion’s shared ambition is to make and keep organizations cyber secure. For this…
News
13 October 2022

Tesorion develops Vulnerability Explorer for Incident Response Teams

Software assigns priority to probability of exploitation of vulnerabilities Leusden, 13 October 2022 – Tesorion, the largest, 100 percent Dutch, independent cyber security service provider, has developed software for Incident Response Teams.…
News
8 September 2022

Tesorion chooses strategic partnership with Cybereason

Quick insight and adequate performance key in battle against cybercrime With the strategic partnership between Cybereason and Tesorion, Tesorion is taking the next step in realizing its growth strategy. Tesorion,…
Read more news
Vulnerability
4 December 2024

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
11 June 2024

PHP CGI Argument Injection Vulnerability

This live blog contains information regarding a PHP CGI Argument Injection Vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks…
CERTSOCVulnerability
12 April 2024

PAN-OS GlobalProtect Gateway vulnerability

This live blog contains information regarding a PAN-OS GlobalProtect Gateway vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
CERTSOCVulnerability
2 April 2024

XZ Utils vulnerability

This live blog contains information regarding a XZ Utils vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
CERTSOCVulnerability
22 February 2024

ConnectWise ScreenConnect vulnerability

This live blog contains information regarding a Connectwise vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
CERTSOCVulnerability
9 February 2024

FortiOS SSL-VPN/FGFM vulnerability

This live blog contains information regarding a FortiOS SSL-VPN/FGFM vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources