Blog
Welcome to the Refracted Security Blog Insights
Discover expert tips, news, and practical advice to help you strengthen your cybersecurity and stay ahead of digital threats.
“We zijn gehackt omdat we gekozen werden.” Dat is het dominante narratief na een incident. Een doelbewuste aanvaller, een gerichte poging, een slachtoffer dat uitgekozen werd. Het klopt niet. Hackers targetten jou niet. Hackers kiezen geen slachtoffers zoals een inbreker huizen kiest. Ze optimaliseren frictieloze extractie. Ze zoeken...
1. Penetration Testing: The Cornerstone of Modern Security Penetration testing (pen testing) is no longer optional—it is a mandatory and foundational requirement in virtually every...
We Came, We Hacked, We Conquered What happens when you mix curious minds, laptops, and Hack The Box challenges? You get one epic night of...
Last week, Stijn Horemans represented Refracted Security in Madrid for the Cyber Resilience Act and Horizontal Standards workshop; a chance to dive deep into how...
If you’ve worked in IT security, you probably know the basics: patch management, endpoint protection, firewalls, detection systems. The rules are clear, and the playbook...
Cybersecurity, Community en een BDV om niet te vergeten Op 22 oktober vond dé Nederlandstalige cybersecurity hoogmis plaats: ANNACON 0x7E9. En wat een editie was...
New school year, new curious minds. Every year, we meet students who are fascinated by cybersecurity but don’t really know where to begin. They’ve heard...
Last week we joined LEVEL UP 2025 at the Evoluon in Eindhoven. The event brought together founders, innovators and investors from across the BeNeLux to...
Data breaches happen. No one likes them. And yet, you have to be prepared. How you respond matters just as much as fixing the technical...
You run an automated scan on your network, patch a few things, and feel that rush of relief. Done. System secure. On to the next...
