Cyber4Z in short

Cyber4Z started in 2015 with two specialists experienced in the cybersecurity domain. We now have a team with various capabilities in the field of strategic and tactical design of cyber security, IT, Privacy and Blockchain technology.

In addition, we are involved in technical and tactical implementations of complex security challenges that focus on the acceptance of new technologies in a pragmatic way. With our expertise and experience, we can guarantee the business objectives of our clients. These are widely determined by laws and regulations, customer requirements and rules of compliance.

  • Predict

  • Prevent

  • Detect

  • Respond

  • Remediate

Who are we?

Our team consists of certified professionals. Quality is our top priority. The technical and tactical implementations we deliver from the strategic design can be externally certified against the ISO9001, ISO27001, NEN7510 or other standards. Therewith we can have our quality tested externally as well. In addition, we provide operational knowledge when it comes to technical security assessments such as penetration tests, project management, SOC / SIEM propositions with connecting services such as log management, vulnerability and compliance management, patch management, training in the field of privacy, security and blockchain technology.

More about Cyber4Z

Our clients

Monthly cybernote: October 2019

Network of large companies were vulnerable due to unpatched VPN leak

The internal networks of several large companies appear to have been accessible to malicious parties for a long time due to a leak in Pulse Secure's vpn software. An update is available that addresses the vulnerability, but it was not installed. It is estimated that 140 system are still unpatched, but it is not clear which companies and organizations are involved. It was discovered, however, that Dutch companies such as KLM, Shell and Luchtverkeersleiding Nederland were vulnerable and malicious parties could enter the internal networks through abuse of the VPN.

The vulnerability was discovered by Taiwanese security researchers in March and then reported to vpn developer Pulse Secure. They closed the leak in April. Nevertheless, a large number of companies and organizations did not implement the patch.

It is not known whether internal files were stolen at these companies by malicious parties. However, there are rumours that, among others, Chinese state hackers are trying to exploit the leak. The National Cyber Security Center estimated the risk of abuse in April to be 'low'. But since the Taiwanese security investigators demonstrated in August how the leak could be exploited, the risk is now adjusted to 'high'.