Cyber Security
Android Devices Are Coming with an unkillable backdoor pre-installed out of the box
Worrying new is emerging that thousands of Android devices are coming with an advanced Triada malware already installed prior to the devices getting on the shelves of resellers. When buying…
Read moreWhat Is SOC 3 Compliance In Terms Of Technology?
SOC 3, Service Organization Control 3, compliance in relation to technology is very similar and closely related to those principles in SOC 2 compliance. The difference is in how the…
Read moreCyber Awareness Month 2023 Useful Tips To Stay Safe In Cyber Space
October is Cyber Security Awareness Month, but here at EagleEyeT this is something we try to educate people year round. In this post we will give you some tips to…
Read more900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors
Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…
Read moreThe paramount importance of vulnerability management
Vulnerability management is the ongoing process of identifying, assessing, prioritizing, mitigating & monitoring computer systems, networks and software. It is of paramount important in ensuring a strong security posture for…
Read moreCyber warfare, the new battleground
Cyber warfare is the new battle ground besides traditional warfare. With todays highly interconnected world, nations as well as non state actors have realized the potential of cyberspace as a…
Read more