May 13, 2025
|
News
Hadrian and Passguard join forces in Dutch cybersecurity partnership

May 13, 2025
|
News
Amsterdam, May 12, 2025 - Two Dutch cybersecurity companies – Hadrian and Passguard – are joining forces to secure businesses against the new wave of cyber attacks. “Hackers are constantly changing their methods, we need to see what criminals see and know what they know. This way, we take action before the attack is launched”, says Rogier Fischer, CEO of Hadrian
Cybercriminals are constantly searching for new entry points to exploit and fresh techniques to bypass a business’s defenses. When traditional vulnerabilities are well-protected, attackers shift tactics. “If all backdoors are closed off by defenders, attackers will simply try to walk in through the front door using the keys of an employee. Those keys are traded on criminal marketplaces on the dark web,” explains Tom Leijte, CEO of Passguard
The partnership expands companies’ visibility of how a hacker might begin an attack against their organization. Hadrian identifies and tests the vulnerable systems of an organization connected to the internet that could be exploited, such as servers and cloud environments. Passguard detects infostealer infections on employee devices being offered for sale on criminal marketplaces.
Over the last 5 years, the frequency of infostealer attacks has increased sixteen times. “Security teams are not able to detect all of the infections, because they occur on unmanaged devices”, Tom Leijte says, CEO of Passguard. “Passguard’s focus on alerting businesses about how infostealers infections have impacted their bottom line is a natural fit for Hadrian’s platform, which tests possible threats. This way, Hadrian’s clients will know whether the access provided by infostealers is still valid.”
“The value of this partnership lies in creating the most comprehensive possible overview of cyber issues before they are exploited. Our customers will now have real-time alerts when, where, and how their sensitive data is being traded. We not only identify the hackers’ attack surface, but also track the information that appears on criminal marketplaces on the dark web.” Fischer concludes.