Pages
- Pen tests
- NIS2: All about the Directive, Legislation and Latest Status
- MDR – Security Monitoring
- IR Retainer
- Hacked, data breach or cyber attack? Incident Response 24/7
- test
- Pentesting: Strengthen your digital resilience with pentesting
- Pen testing & security audits to test your digital resilience
- Security Contracts
- Online Security Awareness event
- MDR seminar
- NFIR quickly to…
- Security awareness
- Pen tests
- EHR & ECD Insights: Dossier monitoring for healthcare
- Managed Detection and Response (MDR).
- Security incidents & threat intelligence reports
- NFIR also tests GGD Registration Portal after CoronaMelder
- Incident Response Plan
- Pentesten & security audits to test your digital resilience
- Legian
- MedMij pen test
- Free consultation about the possibilities of integrated pen testing
- Consultation on the possibilities of pen testing
- Accreditations
- Safe performance of GreyBox pen tests during strict corona measures
- Media
- Data Protection Officer
- Pentesting and Penetration Testing:
Everything you need to know about pen testing. - 6 Important Questions in Pentesting
- Cyber Security Support Contract Questions and Answers
- sitemap
- Vacatures
- Responsible Disclosure
- News, The importance of cybersecurity in 2023: the top companies to protect your business
- Services
- Security incident? Call us 24/7!
- Security awareness for security awareness in the workplace
- Contact
- Complaints procedure
- Cookie policy
- General conditions of sale
- About us
- Partners
- Toreon
- CCRC Foundation
- Hotel Prinsenhof
- Challenge the Cyber
- CIS
- NDI ICT Solutions
- Awaretrain
- Security Delta (HSD)
- Bizway
- Guardian360
- Legian
- Intermax Cloud Services
- PVO
- CCV
- Digital District Zwolle
- The Hague University of Applied Sciences
- Leiden University of Applied Sciences
- SecureMe2
- Dutch Innovation Factory
- Cyber Veilig Nederland
- Branch association BPOB
- Permits
- Why, What, How from NFIR
- Incident Response specialist available 24/7
- Security monitoring, the best way to secure your network
- Home
- Privacy statement
- Dowload Pentesting and vulnerability scans: the differences
Posts
incident response
- Between chaos and control – the art of Incident Response – Post-incident (Part 3) - 4 September 2023
- Between Chaos and Control – The Art of Incident Response – The Investigation Phase (Part 2) - 28 August 2023
- Between chaos and control – the art of Incident Response (Part 1) - 21 August 2023
- How can your organization prepare for a cyber incident? - 2 March 2022
- When am I dealing with a reportable incident data breach? - 18 August 2021
Media
- CyberSecurity Event Zwolle - 3 July 2024
- Careful use of authority: Why independent investigation is critical. - 2 July 2024
- ProxyNotShell: New vulnerabilities in Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) (update) - 12 February 2024
- NFIR and Centric join forces for municipal cybersecurity services - 11 December 2023
- NFIR with Project Melissa in het Financieel Dagblad Financial - 12 October 2023
- Zwolle’s Cyber Security event - 6 October 2023
- NFIR and Project Melissa: A Joint Fight Against Cybercrime - 3 October 2023
- Melissa: a collaborative ransomware fight - 3 October 2023
- ‘Inertia’ KNVB after Russian hack may get tail: ‘From beginning to end tinkering’ by Arwi van der Sluijs - 25 September 2023
- Secure your accounts: the ultimate guide to password protection - 25 August 2023
- Personal data research and the AVG - 15 August 2023
- Protect your organization from phishing: take serious measures against phishing - 1 August 2023
- Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core vulnerabilities (CVE-2023-35078) - 27 July 2023
- Do you ever look in the AmCache? - 27 July 2023
- Top 10 best tips for data security - 19 July 2023
- Citrix ADC & NetScaler Gateway vulnerabilities (CVE-2023-3519) - 18 July 2023
- ShareFile Remote Code Execution (CVE-2023-24489) - 17 July 2023
- Email headers; You can learn this from them - 27 June 2023
- NFIR and Toreon collaborate on Incident Response Services in Belgium - 21 June 2023
- Fortinet Fortigate VPN-SSL vulnerabilities (CVE-2023-27997) - 13 June 2023
- Supply Chain Attack on 3CX: digital attack on popular enterprise VoIP software. (CVE-2023-29059) - 31 March 2023
- If you want to be certified as a hospital on information security, you have to monitor anyway - 15 March 2023
- Festive opening of new second location NFIR in Zwolle - 23 February 2023
- Looking back on a successful Hackerhotel 2023 - 14 February 2023
- Remotely performing Grey Box infrastructure pen testing - 1 February 2023
- Mark Jan Berben (Alphatron Medical): “With this program, you make employees aware and therefore resilient.” - 25 January 2023
- ProxyNotShell: New vulnerabilities in Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) (update) - 2 January 2023
- The 2022 Wrap-Up with Arwi van der Sluijs: ‘2022 is a clear break from trends’ - 22 December 2022
- Ethical hacker NFIR explains how easy hacking really is in broadcast Atlas - 1 December 2022
- NFIR Threat Intelligence Report on critical vulnerability in Citrix - 10 November 2022
- NFIR Threat Intelligence Report – Critical vulnerabilities in OpenSSL software library - 1 November 2022
- New vulnerabilities in Apache Commons Text (CVE-2022-42889) – Text2Shell - 20 October 2022
- Week of Security: Security Awareness live event - 4 October 2022
- What impact does a ransomware attack have on my organization? - 11 July 2022
- NFIR hosts its first MDR Seminar: the importance of monitoring, governing privacy and legal resilience - 7 July 2022
- NFIR Threat Intelligence Report on vulnerability in Confluence (CVE-2022-26134) - 3 June 2022
- What does security monitoring do for my network security? - 3 June 2022
- Threat Intelligence Report regarding BIG-IP F5 Firewall vulnerability (CVE-2022-1388) - 11 May 2022
- Threat Intelligence Report regarding WSO2 vulnerability (CVE-2022-29464) - 25 April 2022
- NFIR Threat Intelligence Report – Indications that vulnerability Spring4Shell (CVE-2022-22965) may be actively exploited - 1 April 2022
- This Spring4Shell flow chart helps you make the right decisions - 1 April 2022
- NPO Radio 1 interviews NFIR on what to do in case of data breach - 30 March 2022
- NFIR receives the CCV Pentest Seal of Approval - 27 January 2022
- Police send mail for found login credentials with help from NFIR - 12 January 2022
- NFIR ISO9001 and ISO27001 certified - 16 December 2021
- NFIR and Awaretrain official partner - 16 December 2021
- This Log4J flow chart helps you make the right decisions - 15 December 2021
- NFIR Threat Intelligence Report: Indications that vulnerability in ‘log4j’ library (CVE-2021-44228) may be actively exploited - 11 December 2021
- NFIR official partner of CIS - 25 October 2021
- NFIR Platinum Sponsor Hackerhotel - 19 August 2021
- “PrintNightmare” Zero-Day Windows vulnerability - 1 July 2021
- NFIR official friend of Challenge The Cyber (CTC) - 1 June 2021
- Interview with Petra Oldengarm, Cyberveilig Nederland - 3 May 2021
- Dutch companies do not have ICT security in order - 15 December 2020
- fd.nl – Hack Apollo Vredestein exposes weak cybersecurity at companies - 15 December 2020
- How safe are organisations’ homeworking facilities? - 8 April 2020
- We help hospitals - 27 March 2020
- NFIR is officially a CERT! - 20 March 2020
- US: large number of organizations compromised through Citrix leak - 11 February 2020
- That’s how you hostage a network, in twelve steps - 14 January 2020
- Sensitive vulnerability Citrix actively abused by cyber criminals - 14 January 2020
security awareness
- How can your organization prepare for a cyber incident? - 2 March 2022
- NFIR discovers that Authority Personal Data leaked employee names - 16 March 2018
Threat intelligence
- ProxyNotShell: New vulnerabilities in Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) (update) - 12 February 2024
- Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core vulnerabilities (CVE-2023-35078) - 27 July 2023
- Citrix ADC & NetScaler Gateway vulnerabilities (CVE-2023-3519) - 18 July 2023
- ShareFile Remote Code Execution (CVE-2023-24489) - 17 July 2023
- Fortinet Fortigate VPN-SSL vulnerabilities (CVE-2023-27997) - 13 June 2023
- Supply Chain Attack on 3CX: digital attack on popular enterprise VoIP software. (CVE-2023-29059) - 31 March 2023
- ProxyNotShell: New vulnerabilities in Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) (update) - 2 January 2023
- NFIR Threat Intelligence Report on critical vulnerability in Citrix - 10 November 2022
- NFIR Threat Intelligence Report – Critical vulnerabilities in OpenSSL software library - 1 November 2022
- New vulnerabilities in Apache Commons Text (CVE-2022-42889) – Text2Shell - 20 October 2022
- NFIR Threat Intelligence Report on vulnerability in Confluence (CVE-2022-26134) - 3 June 2022
- Threat Intelligence Report regarding BIG-IP F5 Firewall vulnerability (CVE-2022-1388) - 11 May 2022
- Threat Intelligence Report regarding WSO2 vulnerability (CVE-2022-29464) - 25 April 2022
- NFIR Threat Intelligence Report – Vulnerabilities in Microsoft Windows operating systems (CVE-2022-26809 & CVE-2022-24491) - 13 April 2022
- NFIR Threat Intelligence Report – Indications that vulnerability Spring4Shell (CVE-2022-22965) may be actively exploited - 1 April 2022
- This Spring4Shell flow chart helps you make the right decisions - 1 April 2022
- This Log4J flow chart helps you make the right decisions - 15 December 2021
- NFIR Threat Intelligence Report: Indications that vulnerability in ‘log4j’ library (CVE-2021-44228) may be actively exploited - 11 December 2021
Uncategorized
- MDR Security Monitoring intern September 2024 - 15 July 2024
- Marketing Communications intern September 2024 - 1 July 2024
- The familiar NFIR, but in a new look! - 19 February 2024
- NIS2: All about the Directive, Legislation and Latest Status - 12 February 2024
- CyberSecurity Event Zwolle - 15 December 2023
- CyberSecurity Event for Municipalities - 21 October 2023
- NFIR with Project Melissa in het Financieel Dagblad Financial - 12 October 2023
- NFIR and Project Melissa: A Joint Fight Against Cybercrime - 3 October 2023
- Global Botnet Disabled Through Cooperation - 3 October 2023
- NFIR official supporting sponsor of CCRC Foundation - 28 February 2023
- Looking back on a successful Hackerhotel 2023 - 14 February 2023
- The 2022 Wrap-Up with Arwi van der Sluijs: ‘2022 is a clear break from trends’ - 22 December 2022
- Ethical hacker NFIR explains how easy hacking really is in broadcast Atlas - 1 December 2022
- Dutch cybersecurity organizations including NFIR put heads together: Ransomware rising sharply - 10 November 2022
- Week of Security: Security Awareness live event - 4 October 2022
- NFIR Threat Intelligence Report – Vulnerabilities in Microsoft Windows operating systems (CVE-2022-26809 & CVE-2022-24491) - 13 April 2022
- FD speaks to NFIR about do’s and dont’s in ransomware attack - 3 November 2021
- What is Emotet malware? And what does it do? - 14 April 2021
- SIEM and SOC - 24 March 2021
- How do you prevent your organization from becoming infected with ransomware? - 10 March 2021
- How do you ensure that your staff works safely from home? - 10 March 2021
Vacatures
- MDR Security Monitoring intern September 2024 - 15 July 2024
- Marketing Communications intern September 2024 - 1 July 2024
- Project coordinator pentesting and awareness (minimum 32 hours) - 4 April 2023
- Sales support associate (minimum 32 hours) - 8 March 2023
- Marketing and events specialist (minimum 32 hours) - 8 March 2023
- IT Security Account Manager (32 to 40 hours). - 8 March 2023
- Project Lead Incident Response - 17 November 2021
- Senior ethical hacker & technical lead - 6 November 2021
- Digital Forensic Investigator wanted - 3 November 2021
- Security Engineer Managed Detection & Response - 1 November 2021