Blogs
Cyber security & Networking
CATEGORIES
Cyber security & Networking
March 05, 2026
Why Compliance-Driven Patching Creates Blind Business Spots
In many organizations, patch management is framed primarily as a compliance exercise. Teams patch to “pass the audit” or to close checklist items. While...
Bart Van den Branden
Cyber security & Networking
December 07, 2025
React2Shell: A Critical Vulnerability With Global Impact – What Organizations Should Know
A critical vulnerability in React and Next.js, known as React2Shell (CVE-2025-55182), is currently being exploited in the wild. In this blog, we outline what...
Raphaël Lheureux
Cyber security & Networking
October 29, 2025
How to use compliance as an empowerment tool
In a world where every organization is the target of phishing and other cyberattacks, people are the first line of defense. This makes security awareness an...
Stéphanie Van den Eynde
Cyber security & Networking
October 22, 2025
Turning Customer Identity into a Business Accelerator
Customer Identity & Access Management (CIAM) is often seen as a technical back-office function. Yet in today’s digital economy, it’s a strategic cornerstone....
Ricardo Kowsoleea
Cyber security & Networking
October 15, 2025
Why integrate vulnerability and compliance management?
Vulnerability management and compliance management are two fundamental aspects of cybersecurity, but they are often neglected; perhaps because they are seen as...
Bart Van den Branden
Cyber security & Networking
October 08, 2025
Uncover hidden attacks with threat hunting
In a modern SOC, threat hunting is not just a nice to have, it is a cornerstone of resilience. By digging into data sources on a recurring basis, hidden...
Raphaël Lheureux
Cyber security & Networking
September 30, 2025
Data-driven security decisions through threat intelligence
Threat intelligence involves the collection and analysis of data to gain insights into threat actors posing cybersecurity risks to your organization. There are...
Raphaël Lheureux
Cyber security & Networking
August 29, 2025
Trojanized PDF Editor application spread through malvertising
The CSIRT (Computer Security Incident Response Team) of Modern SOC recently observed a campaign that leverages malicious advertisements to lure users...
Cristina Aldea
Cyber security & Networking
June 23, 2025
StealeriumPy: A Stealerium variant delivered through ClickFix
The CSIRT (Computer Security Incident Response Team) of Modern SOC recently identified a new variant of the open-source ‘Stealerium’ malware, an...
Cristina Aldea
Cyber security & Networking
Cyber Resilience
May 21, 2025
RSAC 2025: Where Was Cyber Resilience?
The recent RSA Conference 2025 was a whirlwind of cybersecurity sessions, with artificial intelligence dominating the headlines. Yet amid the buzz, one...
Chad Alessi