Swiss Cyber Incident Rebuild (Live): Supply Chain Risk and Actionable CTI in 24 Hours

In Switzerland, cyber incidents rarely stay isolated. In our live session, we reviewed a real Swiss ransomware case impacting a foundation in a high-trust ecosystem, showing how one breach can quickly create downstream supply-chain consequences for partners and stakeholders.With SOCRadar and OpenCTI, we used a simple, defensible method: start with Read more…

baseVISION Achieves Renewal of Microsoft Threat Protection and Cloud Security Specializations

baseVISION Confirms Expertise in Threat Protection and Cloud Security Microsoft has successfully renewed our Threat Protection and Cloud Security Specialization. This renewal once again confirms our proven expertise in defending against modern cyber threats and securing complex cloud environments. Both specializations are reviewed every two years and require validated customer Read more…

Navigating the Shift: Keeping Your ConfigMgr Environment Healthy During the Move to Modern Management

For decades, Microsoft Configuration Manager (ConfigMgr, formerly SMS) has been the trusted solution for managing Windows servers and clients in organizations worldwide. At baseVISION, our team brings decades of hands-on experience in designing, implementing, and maintaining ConfigMgr infrastructures for organizations of all sizes. We are ready to support customers for Read more…

baseVISION TI – Game Over: Build Trust, Deploy Malware

In our latest Threat Intelligence report, baseVISION investigates a malware campaign that spreads through malicious game mods to compromise gamers and potentially corporate environments. The campaign leverages social engineering and the Stealit credential stealer to harvest sensitive data, showing how attackers exploit trusted communities and human behavior rather than technical Read more…

baseVISION TI – Hijacking Microsoft company accounts via TikTok open redirection abuse is still a thing

In our latest TI report, baseVISION uncovers a phishing campaign that abuses TikTok’s open redirect feature to hijack Microsoft credentials. The attackers use multi-stage redirect chains, IP-based cloaking, and Adversary-in-the-Middle (AiTM) phishing pages to bypass MFA and steal session tokens. We break down the full attack chain, indicators of compromise, Read more…

baseVISION TI – Click, Paste and Compromise: When User’s Trust Becomes Your Greatest Vulnerability

In a world where cyber threats evolve faster than ever, one thing remains constant: attackers are still betting on human error. Our latest report, “Click, Paste and Compromise: When User Trust Becomes Your Greatest Vulnerability,” dives deep into the rise of ClickFix—a social engineering technique that tricks users into executing malicious commands through Read more…