Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

Tesorion Vulnerability Explorer powered by EPSS – Blog2BlogCERT
22 September 2022

Tesorion Vulnerability Explorer powered by EPSS – 2

In part 1 of this blog, we introduced the Tesorion Vulnerability Explorer and provided background information on the Exploit Prediction Scoring System (EPSS). In this blog we take a deep…
BlogCERT
15 September 2022

Tesorion Vulnerability Explorer powered by EPSS

During incident response cases, determining how an adversary gained access to the IT infrastructure is not always as clear cut as “It was colonel Mustard in the remote access VPN…
BlogVulnerability
8 April 2022

Spring Framework vulnerabilities

This live blog contains information regarding Spring Framework vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
BlogCERTSOCVulnerability
2 April 2022

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be…
Blog
21 March 2022

Lorenz ransomware rebound: corruption and irrecoverable files

In July 2021, we came across the Lorenz ransomware. Lorenz is a ransomware strain that targets organizations, demanding hundreds of thousands of dollars in ransom. In our analysis in 2021…
Data protectionBlog
17 March 2022

If you are planning to send data via the Internet, please take time to encrypt it!

Why encryption is in your interest Just imagine that you are asked to transport a number of packages to the other side of town in a luxury convertible. You drive…
Read more blogs
News
7 January 2022

Compumatica appoints Pasqualle Verwoedt as CCO

Starting from the 1st of January Pasqualle Verwoerdt, previous Chief Sales Officer at Kahuna, is appointed as the new Chief Commercial Officer at Compumatica. Begin 2021, Tesorion joined forces with…
News
3 January 2022

Information for Kahuna Customers

In the summer of 2021 we informed you about the acquisition of Kahuna by Tesorion. We would like to inform you about the progress of the integration of Kahuna into the…
NewsVulnerability
13 December 2021

Tesorion products not vulnerable to Log4j

Apache Log4j (CVE-2021-44228, CVE-2021-4104, CVE-2021-45046) contains a serious vulnerability. That vulnerability has now been assigned the name 'Log4Shell'. The risk classification, also referred to as the CVSS score, is unchanged:…
News
17 June 2021

Cybersecurity specialist Tesorion acquires industry partner Kahuna

LEUSDEN / AMERSFOORT - Cybersecurity specialist Tesorion acquires industry partner Kahuna. This takeover is creating the largest independent full-service cybersecurity player in the Netherlands which can now offer its corporate,…
Tesorion en Compumatica bundelen de krachtenNews
22 February 2021

Tesorion and Compumatica join forces

Dutch cybersecurity specialists, Tesorion and Compumatica, are joining forces to make the Netherlands digitally more secure. By joining forces the two companies create...
News
1 February 2021

Tesorion strengthens its board

From 1 February 2021, Dutch all-in cyber-security specialist Tesorion is strengthening its board with Henk Bijsterbosch as the ad-interim CCO and Gerben Woordes as the COO...
Read more news
ExchangeCERTSOCVulnerability
5 October 2022

ProxyNotShell Vulnerability

This live blog contains information regarding the ProxyNotShell vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
Vulnerability
5 October 2022

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
Oracle patch updateCERTSOCVulnerability
10 August 2022

VMware authentication bypass

This live blog contains information regarding the VMware authentication bypass, dated august 2022. As soon as we have an update, we’ll add it to this post. More information about possible risks…
Oracle patch updateCERTSOCVulnerability
21 July 2022

Oracle Critical Patch Update

This live blog contains information regarding the Oracle critical patch update, dated july 2022. As soon as we have an update, we’ll add it to this post. More information about…
CERTSOCVulnerability
3 June 2022

Atlassian Confluence vulnerability

This live blog contains information regarding the Atlassian Confluence vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
CERTSOCVulnerability
10 May 2022

F5 BIG-IP vulnerability

This live blog contains information regarding the F5 BIG-IP vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources