European
cyber
consulting.
MACC is a cybersecurity consultancy based in Belgium. We bring practice gained at major European groups and Fortune 500 companies to SMEs and large enterprises — from scoping to delivery.
LIVE THREAT FEED
Industry advisories — MACC monitors what your stack faces
- 15 24 H
- 32 Critical
- 24 7 days
- 6/6 Sources
- 15:08:49 CRIT CCB CVE-2026-4670 Critical authentication bypass in MOVEit Automation
- 11:34:09 CRIT BSI CVE-2026-22709 vm2: Mehrere Schwachstellen
- 11:28:56 HIGH BSI CVE-2026-42994 Bitwarden CLI (npm): Kompromittiertes Paket ermöglicht den Diebstahl …
- 11:24:09 HIGH BSI CVE-2026-25705 Rancher: Schwachstelle ermöglicht Codeausführung und Manipulation von…
- 11:14:08 MED BSI CVE-2026-23234 Linux Kernel: Mehrere Schwachstellen
- 11:09:08 INFO BSI CVE-2026-42186 OpenBao: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- 11:09:07 HIGH BSI — OPNsense: Mehrere Schwachstellen
Six disciplines, one European practice.
From scoping to delivery, all the way to incident response. Audit, offensive, cloud, AI, training, CSIRT. AI Security is our signature.
- 01 FOUNDATION
Cyber risk & compliance
Map risk, structure compliance, prioritise what matters — without drowning teams in audit work.
- 02 PROOF
Offensive security
Test your defences the way an attacker would — clear methodology, clear scope, deliverable your team can actually act on.
- 03 EXECUTION
Cloud & infra security
Secure existing cloud and infrastructure without blocking product delivery — Zero-Trust design, pragmatic hardening, access governance.
- 04 DIFFERENTIATOR
AI Security
Two sides of the same craft: securing your AI models, and using AI to strengthen your security. The MACC specialty.
- 05 RECURRING
Awareness & training
Equip teams to become an asset, not a risk — short formats, concrete content, exercises grounded in your business.
- 06 CRISIS
CSIRT
Prepare, detect, contain, eradicate, recover. Incident response capability available to you — before, during, after.
AI Security: two sides of the same craft.
Securing your AI models. Helping you use AI to strengthen your cybersecurity. Two distinct deliverables, one consultancy.
- AI FOR SECURITY
AI in service of your security
Adopt AI in your cyber operations
- LLM-augmented alert triage (PoC + rollout)
- AI-assisted code review (CI/CD integration)
- Multi-source correlation by language model
- Advanced phishing detection (vision + NLP)
- SECURITY FOR AI
Securing your AI systems
Audit, governance, AI Act compliance
- LLM red teaming (prompt injection, jailbreak)
- RAG / vector store security
- Model supply chain (signed weights, AIBOM)
- EU AI Act compliance for high-risk systems
Four steps, no black box.
Written scoping, fixed quote, concrete deliverable. You talk directly to the consultant running the engagement — not a salesperson, not a junior.
- 01 INITIAL CHAT
45 minutes, free. We figure out what you actually need and whether we can help.
- 02 SCOPING
Written document, clear scope, fixed quote. You decide with full visibility.
- 03 ENGAGEMENT
2 to 8 weeks depending on scope. Frequent check-ins, no end-of-engagement surprises.
- 04 DEBRIEF
Executive deliverable + leadership debrief. Prioritised action plan, not a 200-page PDF.