BlogCERT 5 October 2020 How do entrepreneurs defy cyber-criminals? Cyber-criminality in transport and logistics October is cyber-security month. In the latest version of the… Tesorion Redactie
Blog 1 October 2020 Ranzy Locker (ThunderX 2.0): decryption still possible in some cases! Last week, we published a blog post on our analysis of the new ThunderX ransomware.… Frank van den Hurk
BlogSOC 28 September 2020 Detection and mitigation of phishing attacks Hoe gaat het SOC te werk bij het detecteren en mitigeren van phishing-aanvallen? We geven je een korte blik achter de schermen. Pieter Jan Visser
Blog 21 September 2020 ThunderX ransomware: analysis and a free decryptor! Ransomware is still one of the major cyber security threats for both businesses and consumers.… Frank van den Hurk
BlogTesorion Immunity 19 August 2020 The threats to OT in the big bad world No more water running from the tap, operating rooms that cannot be used, locks that… Jelle van Pol
BlogTesorion Immunity 12 August 2020 Help your employees to be resilient For many years, phishing has been the most successful way to hack into an organisation.… Martin Koster
Blog 27 July 2020 No More Ransom: four years after the launch Today, the 27th of July, Europol issued a press release about the fourth anniversary of… Tesorion Redactie
Blog 6 July 2020 Innovation: the power of cooperation Innovation has various forms, for instance in the area of product development, in the area… Rick Hofstede
BlogSOC 25 June 2020 Puzzling for advanced users “How would you describe your work?’, I ask Elise. She does not need to think… Pieter Jan Visser
BlogTesorion Immunity 12 June 2020 Safeguarding good healthcare in a secure environment, now and in the future Everyone who has ever had contact with a general practitioner, a pharmacist or a specialist… Tesorion Redactie
Blog 4 June 2020 Control over vulnerabilities Almost every organisation protects its infrastructure with basic measures, e.g. a firewall and anti-virus software.… Martin Koster
Blog 18 May 2020 What if patching is no longer an option? Most of the attacks on workstations and servers are carried out via breaches for which… Martin Koster