Blog

Welcome to the Refracted Security Blog Insights

Discover expert tips, news, and practical advice to help you strengthen your cybersecurity and stay ahead of digital threats.

small office kmo

“We zijn gehackt omdat we gekozen werden.” Dat is het dominante narratief na een incident. Een doelbewuste aanvaller, een gerichte poging, een slachtoffer dat uitgekozen werd.  Het klopt niet.  Hackers targetten jou niet. Hackers kiezen geen slachtoffers zoals een inbreker huizen kiest. Ze optimaliseren frictieloze extractie. Ze zoeken...

Visual on compliance and pentesting

1. Penetration Testing: The Cornerstone of Modern Security  Penetration testing (pen testing) is no longer optional—it is a mandatory and foundational requirement in virtually every...

Annaconquer event Annacon x Refracted

We Came, We Hacked, We Conquered What happens when you mix curious minds, laptops, and Hack The Box challenges? You get one epic night of...

Cyber Resilience Act Workshop in Madrid

Last week, Stijn Horemans represented Refracted Security in Madrid for the Cyber Resilience Act and Horizontal Standards workshop; a chance to dive deep into how...

OT Security

If you’ve worked in IT security, you probably know the basics: patch management, endpoint protection, firewalls, detection systems. The rules are clear, and the playbook...

Team Refracted Booth op ANNACON

Cybersecurity, Community en een BDV om niet te vergeten Op 22 oktober vond dé Nederlandstalige cybersecurity hoogmis plaats: ANNACON 0x7E9. En wat een editie was...

Pentester

New school year, new curious minds. Every year, we meet students who are fascinated by cybersecurity but don’t really know where to begin. They’ve heard...

Team Refracted at Level Up event in Eindhoven

Last week we joined LEVEL UP 2025 at the Evoluon in Eindhoven. The event brought together founders, innovators and investors from across the BeNeLux to...

How to communicate a cybersecurity breach to costumers and stakeholders

Data breaches happen. No one likes them. And yet, you have to be prepared. How you respond matters just as much as fixing the technical...

Automated scanning

You run an automated scan on your network, patch a few things, and feel that rush of relief. Done. System secure. On to the next...

Scroll to Top