Blog


More companies fall victim to ransomware, new AP figures show

Blog  — Tue 22 Oct 2024
The number of companies falling victim to ransomware has increased, according to figures released today by the Dutch Data Protection Authority (AP). These figures pertain to last year, 2023, and are now complete. Melissa, a collaboration between the police and security firms, h…

Encrypting Dutch government data abroad

Blog  — Tue 24 Sep 2024
The Dutch government makes use of American cloud services to store data, such as Amazon’s AWS, for example. It also turns out that 75% of government institutions have outsourced their email services to Microsoft or Google. Privacy has always been a topic of concern in this conte…

North Korean supply-chain attack: developers unwittingly spread malware

Blog  — Fri 16 Aug 2024
This month, a remarkable campaign was discovered in which North Korean threat actors used malicious npm packages, including 'qq-console' and 'helmet-validate'. These packages were part of a larger operation, known as the "Contagious Interview" campaign, and were aimed at softwar…

Global system outages due to failed CrowdStrike update

Blog  — Fri 5 Jul 2024
In July 2024, a major cybersecurity incident occurred due to a failed update by CrowdStrike, a leading provider of endpoint security. This incident led to millions of systems crashing worldwide. The update, meant for their Falcon platform, caused severe system disruptions, parti…

How further developed software protects us in a world full of tensions

Blog  — Thu 6 Jun 2024
We live in a time of global tensions and societies that are highly dependent on technology. This can cause friction. An often undervalued aspect of software development is finishing. Often, when custom software is created, it is done through a method that consists of short devel…

120,000 WordPress websites vulnerable due to SQL injection leak in plugin

Blog  — Tue 27 Feb 2024
Around February 24, it was discovered that the WordPress plugin Ultimate Member is vulnerable. The vulnerability involves an attack vector through SQL injection. The latest update of this plugin, version 2.8.3, fixes this vulnerability. However, it appears that many websites hav…

Newly discovered vulnerability threatens almost all bluetooth devices

Blog  — Fri 1 Dec 2023
A vulnerability published on November 28, 2023, under CVE-2023-24023, appears to affect almost all Bluetooth devices. This was discovered by the French assistant professor and researcher at Eurecom, Daniele Antonioli. It involves a so-called man-in-the-middle attack, where an at…

Almost half online fraud cases caused by quick clicks, says ABN Amro

Blog  — Tue 31 Oct 2023
ABN Amro has found, after research, that victims of Dutch online fraud can prevent nearly half of the cases by not clicking on links too quickly. The study involved five hundred victims of online fraud, revealing that 44 percent of them admitted to clicking too quickly, enabling…

Software giants patch numerous critical vulnerabilities, also with Dutch assistance

Blog  — Wed 13 Sep 2023
A tumultuous start to September. Google, Adobe, Mozilla, and Microsoft have patched various zero-day attack vectors in software, ranging from Chrome, Acrobat Reader, Firefox, Thunderbird, Windows, to Word. Some of these vulnerabilities are already being actively exploited, while…

New vulnerability in WinRAR could threaten millions of users

Blog  — Tue 22 Aug 2023
Recently, a serious vulnerability has come to light in the widely used WinRAR software. With a user base of up to 500 million worldwide, this discovery holds potentially far-reaching consequences. The vulnerability, known as CVE-2023-40477, has also been rated with a severity sc…

Internet security and privacy for the advanced and advanced-to-be

Blog  — Fri 28 Jul 2023
This article is about internet security and privacy for advanced users or those who want to delve deeper into the world of cookies and tracking in general, and how being followed can be prevented. Above all, it explains why you should be concerned about this and how you can take…

What did UWV do with cookies and how can I avoid it everywhere?

Blog  — Wed 26 Jul 2023
At the moment, the governmental institution UWV is regularly making headlines. They have possibly not behaved as ethically on the technical front. For example, it recently came to light that they might be placing cookies for a longer duration than is desirable. What is a cookie,…

The importance of monitoring: website and network security

Blog  — Fri 30 Jun 2023
Ensuring the security of our information is of great importance. Monitoring can be compared to installing security cameras to protect your business assets. However, in the field of technology, we often see insufficient attention being given to monitoring our digital assets. Moni…

6 steps to take to get IT security in order

Blog  — Mon 17 Apr 2023
In the rapidly evolving world of technology and digitization, information security has become one of the biggest challenges for businesses. Protecting sensitive information and ensuring customer and employee privacy is critical, but surprisingly, many companies don't think about…

Official response from LastPass regarding break-in possibly too optimistic

Blog  — Thu 2 Mar 2023
LastPass released a new official response on March 1, 2023 about last year's break-in. This article is therefore a follow-up to an earlier article that already laid out the events surrounding the LastPass break-in up to that point. The good news A new post has appeared in LastP…

How did the LastPass break-in end? Did it even end?

Blog  — Tue 31 Jan 2023
In August 2022, LastPass, a digital password vault service, reported that it had been broken into. The latest announcement came just before the holidays. Meanwhile, it is almost February 2023. A good time to look back. At least, what is clear by now? And is it actually over yet?…

Stay alert but also wishing you very happy days ahead

Blog  — Wed 14 Dec 2022
The year is almost over again. The month of the holiday season is upon us. For those working in information security, a month of mixed feelings. On the one hand coziness, family, warmth, food and drinks ... and on the other hand often a high work pressure. From sifting through l…

Concrete example of pre-exploration web attack in 2022

Blog  — Wed 19 Oct 2022
It is estimated that 60% of all web traffic on the internet involves bots, or robots if you will. Some are friendly, others are malicious. Examples of friendly bots include well-known major search engines. These come along to include your website in their search results. In this…

Proposal mandatory device security by European Commission

Blog  — Thu 15 Sep 2022
The European Commission has presented the Cyber Resilience Act proposal. The proposal should apply to any device that can connect to another, or to the Internet. The purpose of the proposal is to make device security, through legislation, no longer voluntarily required of manufa…

WPGateway plugin vulnerable without solution

Blog  — Thu 15 Sep 2022
The WordPress plugin WPGateway has a zero day vulnerability. The vulnerability is numbered CVE-2022-3180. It is a critical issue with potentially serious consequences. All versions of the plugin are at risk, up to and including the current version 3.5. An update with a fix is no…

Increased automated attacks

Blog  — Wed 14 Sep 2022
In the second half of 2022, a predicted but strikingly increasing trend was detected by our SOC. An increase in automated attacks. All devices connected to the Internet will sooner or later encounter curious visitors. Whether it's a camera system, SCADA system or webshop. Often…

Blog opened

Blog  — Fri 9 Sep 2022
Sometimes a small idea grows out of control. And when that moment comes, it's time for new solutions. This blog will help us keep a grip on the news we share. It will not only serve as an archive, but it will also become the central place from which we will share news from now o…