Zero day attack on Avast and AVG: the security software that turned out to be unsecure for 10 years.

Zero day attack on Avast and AVG: the security software that turned out to be unsecure for 10 years.

Avast and AVG are two antivirus programs commonly found on computer systems worldwide. The cybersecurity company, named SentinelOne, discovered two threatening zero day vulnerabilities. That discovery took no less than a decade to occur. SentinelOne suspects that millions of users were exposed to this vulnerability. It has not yet been proven that the flaws were…

Hackers with good intentions are essential

Hackers with good intentions are essential

Tech companies and Open Source projects aim for the highest level of security. They do this by using so-called ‘Bug Bounties’. A concept where ethical hackers are rewarded for finding weaknesses in a system and properly reporting it to the related company. Ethical hackers, also called ‘White Hat hackers’, attack the weaknesses of an IT…

The attack on SolarWinds with an international impact

The attack on SolarWinds with an international impact

A disturbing trend in recent years has been the increase in cybercrime. Previously, we wrote a blog about the Hafnium hack. Unfortunately, there are several incidents where the consequences are significant. The attack on SolarWinds in 2019, now also commonly known as Solorigate, is the most unprecedented cyber security breach to date. The reason it…

Explained: what is End-To-End Encryption?

Explained: what is End-To-End Encryption?

You’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. Messages and calls are end-to-end encrypted so no one outside the chat can read or listen to them. Sounds good. But how does that actually work and in what environments is it used? We will be covering it for you in this…

Can Bitwarden guarantee our security?

Can Bitwarden guarantee our security?

Multifactor authentication is necessary to protect us in a digital environment. You can read more about that in our blog on the importance of MFA. In this blog we describe the need for a complex password and the solution; using a password manager like Bitwarden. The password we enter every time we log in. A…

Can MFA secure our personal identity?

Can MFA secure our personal identity?

In order to work with different programs or websites, we first need to log in. Our login credentials consist of a username and password. Is that password enough to ensure your safety? The answer is no. We tend to be prone to using passwords that are too weak as Michael McIntyre demonstrates in a humorous…

The Hafnium Hack

The Hafnium Hack

Alarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed hackers to access a company’s servers, emails and calendars. Hafnium, a group of hackers that is well trained and operates in a sophisticated manner from China is the culprit. The Hafnium Hack. It was revealed in March 2021 and it caused a…

Train your users in digital hygiene

Train your users in digital hygiene

It’s becoming increasingly more common. Data breaches, companies being hacked and important information being stolen. It is important as a company to identify where your organization is vulnerable. Establishing excellent security is a priority. You can read more about that here. Unfortunately, hackers attack you where you are most vulnerable, which may be your employees….

Microsoft Secure Score

Microsoft Secure Score

Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date is a must. It is often difficult to get an overview of your organization’s current security level. Microsoft makes it happen with Microsoft Secure Score. A tool that performs a security analysis within Microsoft 365. The Microsoft Secure Score belongs to Microsoft 365…