top of page
BLOG



Daniel Eberhorn
Dec 2, 2024
Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!


Daniel Eberhorn
Nov 7, 2024
🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.


Daniel Eberhorn
Apr 8, 2024
🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.
bottom of page