baseVISION TI – A Looming Menace and Escalating Threat to macOS users

Cybercriminals are increasingly targeting macOS with infostealers, exploiting the growing adoption of Mac devices in corporate environments. Our latest TI-Report uncovers: A 101% increase in macOS infostealer activity in 2024 How Atomic (AMOS) and Poseidon are spreading in Switzerland The tactics behind phishing, malicious downloads, and malvertising Key mitigations to Read more…

baseVISION SOC and Microsoft Security: Monitoring IOT/OT Environments – Is It Possible?

Approaches to Implementing the Purdue Model with Microsoft Security In the age of digital transformation, companies worldwide are facing new challenges in cybersecurity, particularly due to the increasing integration of Operational Technology (OT) into digital networks. While IT security solutions have been continuously developed for years, OT security has long Read more…

baseVISION TI – How threat actors are abusing Microsoft Teams to trick your employees, and what you can do about that

Cybercriminals are increasingly using Microsoft Teams to bypass security controls and target employees. Our first TI-Report uncovers: How groups like Black Basta use Teams as an attack vector The tactics behind phishing, vishing, and email bombing Key mitigations to protect your organization Get the full insights and Indicators of Compromise Read more…

Exploring our SOC – What are the benefits of having Security Analysts?

Who should analyze Security Incidents? Insights and recommendations in baseVISION’s latest video In cybersecurity, companies often wonder who should handle incident analysis: engineers, internal support teams, or an external Security Operations Center (SOC)?  Thomas Kurth (CEO and Senior Expert Security Consultant) and Christoph Düggeli (Senior Security Analyst) dive into this Read more…