BLOGS

Onze inzichten

Verken deskundige inzichten over cybersecuritytrends, bedreigingen en strategieën om uw bedrijf veilig te houden.

The Collins Aerospace Cyberattack: A Wake-Up Call for Aviation Cybersecurity

Security

Sep 21, 2025

The Collins Aerospace Cyberattack: A Wake-Up Call for Aviation Cybersecurity

The recent cyberattack on Collins Aerospace disrupted major European airports, exposing critical vulnerabilities in aviation’s reliance on centralized technology providers. This incident underscores the growing threat landscape, with aviation cyberattacks surging by 600% in the past year. The blog explores lessons in vendor risk, resilience, and pragmatic cybersecurity planning to safeguard global air travel.

Entra ID Actor Token: Risk, Impact, and Immediate Mitigations

Security

Sep 19, 2025

Entra ID Actor Token: Risk, Impact, and Immediate Mitigations

A critical flaw in Microsoft Entra ID’s Actor tokens exposed tenants worldwide to silent Global Admin compromise. Our blog explains how the vulnerability worked, its risks, and the key mitigations organizations need to adopt.

npm Debug & Chalk Breach: Lessons from a Supply-Chain Attack

Security

Sep 11, 2025

npm Debug & Chalk Breach: Lessons from a Supply-Chain Attack

A supply-chain compromise of popular npm packages like `debug` and `chalk` injected stealthy crypto-stealing malware, underscoring urgent risks in open-source dependencies and the need for stronger defenses.

CVE-2025-42957: Critical SAP S/4HANA Vulnerability Now Exploited in the Wild

Security

Sep 8, 2025

CVE-2025-42957: Critical SAP S/4HANA Vulnerability Now Exploited in the Wild

A critical flaw in SAP S/4HANA (CVE-2025-42957, CVSS 9.9) is under active exploitation, allowing attackers to gain near-total control over enterprise SAP systems. This blog breaks down how the vulnerability works, the risks it poses, and the immediate steps organizations must take to protect their mission-critical operations.

Jaguar Land Rover Cyberattack: Managing Risk in a Connected Automotive World

Security

Sep 4, 2025

Jaguar Land Rover Cyberattack: Managing Risk in a Connected Automotive World

Jaguar Land Rover’s recent cyberattack highlights how digital threats now disrupt not just IT, but entire manufacturing and supply chain operations. This blog explores key lessons in resilience, supply chain security, and OT protection for today’s connected industries.

Palo Alto Networks Breach: Lessons from the Salesloft Drift Supply-Chain Attack

Security

Sep 4, 2025

Palo Alto Networks Breach: Lessons from the Salesloft Drift Supply-Chain Attack

Discover how the Palo Alto Networks breach, linked to the Salesloft Drift supply-chain attack, exposed the risks of OAuth token misuse. This blog unpacks the attack process, what went wrong, industry breach statistics, and practical steps organizations can take to strengthen SaaS and supply-chain security.

ShadowCaptcha Attack Turns WordPress Sites into Malware Delivery Platforms

Security

Aug 29, 2025

ShadowCaptcha Attack Turns WordPress Sites into Malware Delivery Platforms

ShadowCaptcha is a new campaign exploiting vulnerable WordPress sites to spread ransomware, info-stealers, and crypto miners. By luring victims with fake CAPTCHA pages, it combines technical exploits with social engineering to bypass defenses and cause severe damage.

Beyond Botnets: The Rise of GeoServer Exploits, PolarEdge, and Gayfemboy in Cybercrime

Security

Aug 27, 2025

Beyond Botnets: The Rise of GeoServer Exploits, PolarEdge, and Gayfemboy in Cybercrime

Cybercrime is shifting from noisy botnets to stealthy, profit-driven campaigns exploiting internet-facing services (e.g., GeoServer, Redis) and IoT devices. Advanced threats like PolarEdge’s ORB botnets and Gayfemboy malware focus on persistence, covert operations, and monetization (cryptojacking, DDoS). Organizations must adopt proactive patching, anomaly detection, segmentation, and stronger security awareness to stay resilient.

Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems

Security

Aug 8, 2025

Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems

Akira ransomware is exploiting a likely zero-day in SonicWall SSL VPNs, breaching even fully patched systems and moving from access to encryption within hours. The attacks highlight that patching alone isn’t enough—organizations need layered defenses, MFA, active VPN monitoring, and network segmentation. Cybersecurity must be continuous, as attackers adapt and remote access systems remain prime targets.

Neem contact op!

We zijn hier om te verkennen wat werkt, wat niet werkt en wat de volgende stappen zijn. Laten we afstemmen hoe we kunnen helpen.

Nederland

Tachyon Security BV, Veenland 29 2291NS Wateringen, The Netherlands

Verenigde Staten

12620 FM 1960 Rd W, Ste A4, Houston, Texas 77065 USA