From Exeon’s security experts to you

As a team of cybersecurity experts, data scientists and innovators, we share insights gained from our research and work in the field—for today and the future.

SIEM vs NDR - How to improve your SOC with NDR
NDRCompliance

SIEM vs. NDR: Who is improving modern SOCs?

How Network Detection and Response enhances SOCs with advanced threat detection, cost efficiency, and scalability. Watch the recording

Melissa Rabe

Author

Phishing and lateral movement - Exeon cybersecurity blog
UEBANDR

Phishing Despite Active MFA

MFA is no longer enough. Attackers use phishing to steal credentials and move laterally—completely undetected. Tools like EDR,

Denis Matosevic

Author

What is DLL Sideloading - Exeon Blog
NDR

(Ab)using DLL Sideloading: How to Detect This Growing Threat

What is DLL sideloading? DLL sideloading exploits how Windows applications handle Dynamic Link Library (DLL) files. When a

Luca Forcellini

Author

How to monitor and detect supply chain attacks - Exeon blog
OT SecurityMachine LearningNDR

How to Monitor & Stop Supply Chain Attacks

A supply chain attack is a type of cyberattack that targets the software or hardware supply chain. Instead

Philipp Lachberger

Author

Is on-premises better than cloud security - Exeon
OT SecurityMachine LearningNDR

Cloud Security vs On-Premises

While cloud solutions often offer strong security, some opt for on-prem systems for greater control, performance, offline reliability

Anne Murakaru

Author

Octo2 Malware - Exeon Blog
NDRMachine Learning

Octo2: The Evolution of A Dangerous Malware Family

(image generated via DALL·E) The Octo (ExobotCompact) malware family has become the dominant threat in the cyber security

Andreas Hunkeler

Author

Incident Response - Why prevention and detection come first
NDRComplianceEDR

Incident Response in Cybersecurity

Why Companies Should Focus on Prevention and Detection First Cyberspace threats are constantly increasing, and cyberattacks have considerable

Melissa Rabe

Author

How to avoid SOC mistakes - Exeon cybersecurity blog
NDROT Security

Major SOC Mistakes and How You Can Avoid Them

For many organizations, an in-house or managed security operations center (SOC) plays a critical role in monitoring and

Luca Forcellini

Author

Best of Breed or Best of Suite - Exeon Blog
NDREDR

Best-of-Breed Done Right

Why a multi-vendor approach is a secure idea What is Best-of-Breed? In the context of cyber security, a

Klaus Nemelka

Author

All about the 2024 Allianz Risk Barometer study
OT SecurityMachine Learning

Allianz Risk Barometer: Heightened Alarm on Cyber Threats

Based on the Allianz Risk Barometer results, how can you best protect your organization from cyber-attacks? Here are

Melissa Rabe

Author

All about the Windows blue screen event caused by Crowdstrike
EDRNDROT Security

A Wrap-Up of 07-19

Executive Summary Intro A faulty update published by CrowdStrike caused massive global IT outages last Friday, affecting numerous

Klaus Nemelka

Author

Head of Professional Services - Cybersecurity Engineer Blog
Life at Exeon

A Day in the Life of a Security Engineer

Interview with Harald Beutlhauser & Axel Rensing, Senior Professional Services Engineers What It Means to be a PS

Jade Bischoff

Author

Akira Blog - How the Akira hack could have been prevented
Machine LearningNDR

Akira Ransomware: How to Protect Your Business

The Akira ransomware group quickly gained notoriety. The group emerged in March 2023 and is already the fourth

Klaus Nemelka

Author

Air-gapping as a security practice - Exeon blog
NDR

Air-Gapping: Not Only Love Is in the Air

Can Air-Gapping Alone Improve Cybersecurity for Critical Industries? Air-gapping is a security measure designed to isolate digital assets

Connor Wood

Author

Switzerland and the EU - NIS2 and New Cybersecurity Legislations
Compliance

Switzerland and the EU: NIS2 and New Cybersecurity Legislations

The Information Security Act and NIS2: Strengthening Cybersecurity in Switzerland On November 8, 2023, the Federal Council decided

Gregor Erismann

Author

Obfuscation explained by Harald Beutlhauser - Exeon Blog
NDREDR

Obfuscation: Good to Protect, Hard to Detect

What is Obfuscation? Obfuscation is an important technique for protecting software, but it also carries risks, especially when

Harald Beutlhauser

Author

How to catch data exfiltration - Exeon blog
NDRMachine Learning

How to Catch Data Exfiltration with Machine Learning

Why is Detecting Data Exfiltration So Important? In today’s landscape, there is an unprecedented surge in ransomware attacks

Andreas Hunkeler

Author

Deep Packet Inspection vs. Metadata Analysis
NDROT Security

Deep Packet Inspection vs. Metadata Analysis

As encrypted traffic soars and networks grow more complex, traditional Deep Packet Inspection (DPI) struggles. Enter metadata analysis

Dr. sc. David Gugelmann

Author

The Cyber Resilience Act - CRA - Exeon Blog
ComplianceOT Security

Cyber Resilience Act (CRA) is Here to Stay

The EU’s Cyber Resilience Act mandates built-in cybersecurity for all digital products. From CE marks to SBOMs and

Philipp Lachberger

Author

Zero Trust and compliance go hand in hand - Exeon
ComplianceNDR

Why Zero Trust and Compliance Go Hand in Hand

Pairing Zero Trust with compliance frameworks like NIS2, GDPR, and HIPAA is essential. By integrating strict access controls,

Klaus Nemelka

Author

OT Security and Zero Trust Blog - How to comply to NIS and DORA
OT SecurityCompliance

Extending NIS & DORA to OT Networks: A Zero Trust Approach

The Zero Trust approach is a comprehensive strategy to address compliance challenges covering all from IT, OT to

Klaus Nemelka

Author

Machine Learning Algorithms from a Detection Engineers' Perspective
Machine LearningLife at ExeonNDR

Machine Learning Algorithms from a Detection Engineers’ Perspective

Detection engineers navigate unique scenarios when building detections, in addition to the challenges of new, complex threats. This

Andreas Hunkeler

Author

NDR vs. IPS - Exeon cybersecurity blog
NDRMachine Learning

How Network Detection and Response (NDR) Fills the Security Gaps of Intrusion Prevention Systems (IPS)

In order to identify and prevent threats, IPS relies on signature-based detection. However, this can cause various blind

Jade Bischoff

Author

Switzerland cybersecurity situation and defense strategies
NDR

Switzerland’s Security Situation: Hybrid Threats Require Fundamental Defense Strategies

Switzerland’s security environment is becoming more complex from year to year, as reported by the Federal Intelligence Service

Klaus Nemelka

Author

Why Network Detection and Response is the solution against Zero-Day exploits
OT SecurityMachine LearningNDR

Uncovering Blind Spots: Zero-Day Exploit Detection

Why NDR is crucial to detect zero-day exploits Understanding Zero-Day Exploits Within the realm of cybersecurity, zero-day exploits

Connor Wood

Author

How to detect the Microsoft Exchange Hack
NDRMachine Learning

How to Detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic

Dr. sc. David Gugelmann

Author

OT Network Protection - Exeon Cybersecurity Blog
NDRMachine LearningOT Security

Beyond IT Security: OT Network Protection

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing

Anne Murakaru

Author

NIS2 and DORA liability - Cybersecurity blog
ComplianceNDR

NIS2 & DORA: Managers Are Liable for Cybersecurity

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which

Michael Tullius

Author

FeedMeter Cyber Threat Intelligence by Dr. Markus Happe
Machine LearningPartnerships

Smarter Cyber Threat Intelligence: FeedMeter

(Photo credit: ZHAW Zurich University of Applied Sciences) A Research & Development Project on Enhancing Cyber Defense Cyber

Dr. Markus Happe

Author

SOC Visibility Triad and the Role of NDR
NDREDR

SOC Visibility Triad & the Role of NDR Solutions

How the SOC Visibility Triad enhances threat detection by combining SIEM, NDR, and EDR for stronger cybersecurity, and

Gregor Erismann

Author

IT and OT Convergence in Cybersecurity on the Exeon blog
OT SecurityNDR

Live the IT/OT Convergence, Enhance Security!

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not

Philipp Lachberger

Author

Detect and hunt the exploitation of network device vulnerabilities
EDRMachine LearningNDR

How to Detect the Exploitation of Network Device Vulnerabilities

In this article, we share some ideas on how to detect and hunt the exploitation (meaning the abuse)

Axel Rensing

Author

New reporting obligation for cyberattacks in Switzerland
ComplianceOT Security

The New Reporting Obligation for Cyberattacks in Switzerland

Everything You Need To Know Since January 1, 2025, a reporting obligation for cyberattacks on critical infrastructure is

Gregor Erismann

Author

XZ Utils and Liblizma Backdoor - Exeon blog
OT SecurityNDR

Liblzma & XZ Utils Backdoor: What It Means and How to Detect It

All about the XZ utils & liblzma backdoor, and why the best way to foster your security strategy

Klaus Nemelka

Author

The Future of Network Security
Machine LearningNDR

The Future of Network Security: Predictive Analytics & ML-Driven Solutions

As the digital age evolves and continues to shape the business landscape, corporate networks have become increasingly complex

Andreas Hunkeler

Author

secIT cybersecurity event - Exeon blog
Events & AwardsLife at ExeonNDRPartnerships

secIT: An Outlook on a Secure Future

Pictured above: at the last secIT event, our valued partner NETCOR GmbH supported Exeon at the booth for

Jade Bischoff

Author

Monthly Cyber Flash

Our monthly newsletter provides you with insights from IT security decision-makers and technical experts, events, webinars, and industry news. Sign up below!