Cyber Security

11.12.2023-Android-Devices

Android Devices Are Coming with an unkillable backdoor pre-installed out of the box

Worrying new is emerging that thousands of Android devices are coming with an advanced Triada malware already installed prior to the devices getting on the shelves of resellers. When buying…

Read more
What-Is-SOC-3

What Is SOC 3 Compliance In Terms Of Technology?

SOC 3, Service Organization Control 3, compliance in relation to technology is very similar and closely related to those principles in SOC 2 compliance. The difference is in how the…

Read more
Cyber Awareness Month 2023 Useful Tips To Stay Safe In Cyber Space

Cyber Awareness Month 2023 Useful Tips To Stay Safe In Cyber Space

October is Cyber Security Awareness Month, but here at EagleEyeT this is something we try to educate people year round. In this post we will give you some tips to…

Read more
900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors

900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors

Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…

Read more

The paramount importance of vulnerability management

Vulnerability management is the ongoing process of identifying, assessing, prioritizing, mitigating & monitoring computer systems, networks and software. It is of paramount important in ensuring a strong security posture for…

Read more
CYBER WARFARE

Cyber warfare, the new battleground

Cyber warfare is the new battle ground besides traditional warfare. With todays highly interconnected world, nations as well as non state actors have realized the potential of cyberspace as a…

Read more