Publications

Tesorion has a clear vision, we want to be relevant and contribute to a cyber-safe Netherlands. In addition, our experts visit our customers daily (in many cases virtually). During our activities and investigations we encounter new threats or the solution against them. It is precisely this knowledge that helps to improve cyber security, minimize and solve cybersecurity challenges. In short, we bundle all that information into different types of publications. We are happy to offer you these via this page.

BlogVulnerability
8 April 2022

Spring Framework vulnerabilities

This live blog contains information regarding Spring Framework vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
BlogCERTSOCVulnerability
2 April 2022

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be…
Blog
21 March 2022

Lorenz ransomware rebound: corruption and irrecoverable files

In July 2021, we came across the Lorenz ransomware. Lorenz is a ransomware strain that targets organizations, demanding hundreds of thousands of dollars in ransom. In our analysis in 2021…
Data protectionBlog
17 March 2022

If you are planning to send data via the Internet, please take time to encrypt it!

Why encryption is in your interest Just imagine that you are asked to transport a number of packages to the other side of town in a luxury convertible. You drive…
Blog
14 March 2022

The danger of Wiper malware

In recent years, we have seen many cyberattacks involving ransomware or malware aimed at stealing sensitive data. Shortly before the Russian army invaded Ukraine, a less common malware variant was…
Blog
7 February 2022

Encryption: the new Olympic sport

The Winter Olympics are starting in Peking on 4 February. In recent weeks, a variety of articles have been published on the athletes' (lack of) safety in terms of their…
Read more blogs
News
7 January 2022

Compumatica appoints Pasqualle Verwoedt as CCO

Starting from the 1st of January Pasqualle Verwoerdt, previous Chief Sales Officer at Kahuna, is appointed as the new Chief Commercial Officer at Compumatica. Begin 2021, Tesorion joined forces with…
News
3 January 2022

Information for Kahuna Customers

In the summer of 2021 we informed you about the acquisition of Kahuna by Tesorion. We would like to inform you about the progress of the integration of Kahuna into the…
NewsVulnerability
13 December 2021

Tesorion products not vulnerable to Log4j

Apache Log4j (CVE-2021-44228, CVE-2021-4104, CVE-2021-45046) contains a serious vulnerability. That vulnerability has now been assigned the name 'Log4Shell'. The risk classification, also referred to as the CVSS score, is unchanged:…
News
17 June 2021

Cybersecurity specialist Tesorion acquires industry partner Kahuna

LEUSDEN / AMERSFOORT - Cybersecurity specialist Tesorion acquires industry partner Kahuna. This takeover is creating the largest independent full-service cybersecurity player in the Netherlands which can now offer its corporate,…
Tesorion en Compumatica bundelen de krachtenNews
22 February 2021

Tesorion and Compumatica join forces

Dutch cybersecurity specialists, Tesorion and Compumatica, are joining forces to make the Netherlands digitally more secure. By joining forces the two companies create...
News
1 February 2021

Tesorion strengthens its board

From 1 February 2021, Dutch all-in cyber-security specialist Tesorion is strengthening its board with Henk Bijsterbosch as the ad-interim CCO and Gerben Woordes as the COO...
Read more news
Vulnerability
18 May 2022

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
10 May 2022

F5 BIG-IP vulnerability

This live blog contains information regarding the F5 BIG-IP vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details…
CERTSOCVulnerability
14 April 2022

Microsoft Remote Procedure Call vulnerability

This live blog contains information regarding the Microsoft Remote Procedure Call vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks…
CERTSOCVulnerability
13 April 2022

VMware Workspace ONE Access vulnerabilities

This live blog contains information regarding vulnerabilities in VMware Workspace ONE Access. As soon as we have an update, we’ll add it to this post. More information about possible risks…
BlogVulnerability
8 April 2022

Spring Framework vulnerabilities

This live blog contains information regarding Spring Framework vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can…
BlogCERTSOCVulnerability
2 April 2022

Gitlab vulnerabilities

This live blog contains information regarding Gitlab vulnerabilities. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be…
Read more vulnerabilities
Resources
22 July 2021

Onepager CISO as a Service

Time for a cybersecurity operator Flexible CISO Cybersecurity and an appropriate cybersecurity policy are dependent on many factors, such as the size of your organization, the processes and the extent…
Resources
18 July 2021

Onepager Pen testing

What if a hacking attempt occurs? Find the vulnerability Increase your digital resilience and protect your digital valuables. One day an actual incident takes place. You have already invested in…
Resources
18 July 2021

Onepager Digital Risk Protection

Do you know what? goes on out of sight ? Protect your crown jewels Undoubtedly, you monitor whether your business is mentioned in the media or on the internet. This…
Resources
18 July 2021

Retrospect Report #1

Tesorion sees an increase in cyber attacks When returning to the office In the Tesorion Retrospect we look back at the past year, one in which the coronacrisis has severely…
Resources
13 July 2021

Tesorion Technical Update

Would you like to receive critical vulnerabilities when known by e-mail from now on? Subscribe to Tesorion Technical Update.
Resources
8 July 2021

Industry paper awareness in healthcare

Voorkom datalekken door ervoor te zorgen dat elke medewerker weet wat belangrijk wanneer deze omgaat met persoons- of bedrijfsdata
Read more resources