Company News

baseVISION TI – Patch, Exploit, Repeat: A Never-Ending Cycle for Windows Common Log File System Driver Vulnerabilities
Since 2024, multiple zero-day vulnerabilities in the Windows Common Log File System (CLFS) driver have been exploited by ransomware groups like RansomEXX and Play (Balloonfly). These Elevation of Privilege (EoP) flaws enabled SYSTEM-level access and were used in real-world attacks before patches were released. Microsoft issued fixes across several Patch

Welcome Keith
We’re excited to welcome Keith Potter to the baseVISION team!As a Senior Security Consultant, he brings deep expertise and fresh perspective to our security services. We’re looking forward to a great collaboration – welcome aboard, Keith! New job? We are always looking for new, motivated people to join our team.

baseVISION among the top 5 at the Microsoft Security Excellence Awards 2025
Recognition for Our Holistic Managed Security Services Strategy baseVISION has been recognized as one of the top five Managed Security Service Providers worldwide at the Microsoft Security Excellence Awards 2025. This top placement in the “Security MSSP of the Year” category highlights both our innovative strength and the ongoing commitment

Microsoft Security Excellence Award 2025
baseVISION is a finalist for the Microsoft Security Excellence Awards 2025! We’re excited to share some big news—baseVISION has been named a finalist for the Microsoft Security Excellence Awards 2025 in the category Security MSSP of the Year! This puts us among the top Managed Security Service Providers (MSSPs) globally,

baseVISION TI – The Rise of Crypto Scams: How Speculative Trading Fuels Cyber Threats
With the announcement from the USA President regarding a new cryptocurrency reserve, so-called Crypto Strategic Reserve, we anticipate an increase in speculative trading and more exposure to scams from people trying to profit from the current market. Some of the most popular topics in cryptocurrency are related to crypto trading

baseVISION TI – A Looming Menace and Escalating Threat to macOS users
Cybercriminals are increasingly targeting macOS with infostealers, exploiting the growing adoption of Mac devices in corporate environments. Our latest TI-Report uncovers: A 101% increase in macOS infostealer activity in 2024 How Atomic (AMOS) and Poseidon are spreading in Switzerland The tactics behind phishing, malicious downloads, and malvertising Key mitigations to

QR code authentication: a new simplified sign-in experience for frontline workers
Last week, Microsoft introduced a new authentication method to Microsoft Entra ID called QR code. This new authentication method is currently in public preview and satisfies single-factor authentication requirements and is designed but not limited to frontline workers. The new authentication methods consist of two artefacts, the QR code,

baseVISION SOC and Microsoft Security: Monitoring IOT/OT Environments – Is It Possible?
Approaches to Implementing the Purdue Model with Microsoft Security In the age of digital transformation, companies worldwide are facing new challenges in cybersecurity, particularly due to the increasing integration of Operational Technology (OT) into digital networks. While IT security solutions have been continuously developed for years, OT security has long

Exploring our SOC – Why detection coverage matters
Understanding detection coverage: Why it’s essential for your security strategy In today’s cybersecurity landscape, detection coverage is a key factor in building a strong defense. Yet, many organizations still have blind spots that leave them vulnerable to threats. In our video, Christoph Düggeli (Teamlead and Senior Security Analyst) and Thomas