The Exeon Blog
Welcome to the Exeon Blog page! As a passionate, interdisciplinary team of data scientists, machine learning experts, white hat hackers, network security specialists and business professionals, we have diverse insights to offer on the complex topic of cybersecurity. Through regular contact and discussions with industry leaders and IT Security decision-makers, we want to transverse these insights into applicable and compelling Blog posts for the interested public. Enjoy our selection of the most recent Blogs below.
11.12.2024
How to Stay Secure While NIS2 Takes Its Time
NIS2 was intended to set a new standard for cybersecurity in the EU. However, local law implementation has been delayed in several countries, impacting security in those companies affected by and exposed to regulatory uncertainty and increasing the responsibility of organizations to better ensure cyber resilience themselves.
05.12.2024
Octo2: The Evolution of A Dangerous Malware Family
The emergence of sophisticated malware such as Octo2 poses a significant challenge for cyber security professionals. With its advanced features, such as enhanced remote access capabilities, advanced obfuscation techniques, and new Domain Generation Algorithm, Octo2 is an example of an always faster-evolving threat landscape.
16.11.2024
Incident Response: Why Focus on Prevention & Detection First
Incident response encompasses a range of measures and technologies that help companies be prepared for security incidents and detect and minimize them as early as possible. A well-prepared IR plan improves a company's ability to respond and strengthens its overall security posture. The goal is to respond faster and minimize damage.
15.11.2024
The Privacy Dilemma in Cybersecurity
Imagine if, back in 2010, we had the AI technologies we have today. Would airports have rushed to implement body scanners? With more intelligent AI, it’s clear that security could have been enhanced without compromising personal privacy. This same logic applies to cybersecurity today. With AI-powered NDR solutions, you can enjoy better protection without invasions of privacy.
12.11.2024
The Security State of Switzerland
Switzerland's security environment is becoming more complex each year, as the Federal Intelligence Service reports in its annual report. Of particular concern are international terrorism, current military conflicts, and increasing cooperation between various autocracies that cooperate at a political and military level. This development also impacts cyber security in Switzerland, as attacks by state and non-state actors are becoming increasingly frequent and complex.
24.10.2024
Cyber Resilience Act (CRA) is Here to Stay
The EU Cyber Resilience Act (CRA) aims to enhance cybersecurity for digital products sold within the EU by requiring compliance with strict security standards. Enacted in October 2024, it mandates that manufacturers ensure their products, including software and IoT devices, are secure throughout their lifecycle. It complements the NIS2 Directive, focusing on supply chain security and proactive vulnerability management.
09.10.2024
FeedMeter: Smarter Threat Intelligence
Enter FeedMeter—a platform designed to simplify this process. FeedMeter collects, normalizes, and aggregates threat intelligence feeds while continuously evaluating them using eight descriptive metrics to approximate feed quality.
17.09.2024
Zero Trust is Good, Control is Better
The digital transformation has connected formerly isolated OT networks to IT, which brings opportunities and new security challenges: integration means that OT systems are increasingly exposed to threats, which requires robust security measures such as Zero Trust. Network Detection and Response and its AI detects and responds to these threats in real-time, protects OT environments, and improves Zero Trust security.
19.08.2024
Last Call for DORA
The DORA enforcement date is quickly approaching. As DORA addresses cybersecurity, ICT risks, and digital resilience, affected companies should check their cybersecurity practices and operational resilience. Here’s how to ensure full DORA compliance and cybersecurity for your organization and IT systems, along with the new DORA checklist.
12.08.2024
Happy 8th Birthday, Exeon!
As we celebrate our company's eighth birthday, it's a perfect time to reflect on the journey we've taken together at Exeon. To mark this special occasion, we posed one question to each member of our management team, diving into their personal experiences, challenges faced, and vision for the future. Join us as we delve into their unique insights and celebrate the milestones we've achieved together.
23.07.2024
A Wrap-Up of 07-19
Crowdstrike's faulty update caused global IT outages, affecting 8.5 million Windows devices and numerous critical infrastructures such as airports, banks, healthcare, and government institutions. As cybercriminals attempted to exploit the situation, we present thorough analysis and methods to prevent and detect such incidents from happening.
22.07.2024
Obfuscation: Good to Protect, Hard to Detect
Obfuscation is used to protect software and sensitive data by making code and information difficult to understand, but it can also be exploited by malware authors. Methods such as encryption, replacing data with placeholders, and inserting meaningless code, are employed to achieve it, while advanced detection systems like ExeonTrace avoid the need for obfuscation by being invisible in the network.
03.07.2024
Not Only Love is in the Air
Learn how air-gapping as a security measure protects digital resources and networks by isolating them from external connections to ward off hackers, malware and other threats. Despite the benefits, there can also be security problems, which is why the right configuration is crucial for an effective cyber security solution.
21.06.2024
Live the IT/OT Convergence, Enhance Security!
Explore the concept of IT-OT convergence and its impact on enterprises: learn about IT/OT integration, its benefits, types, and security challenges, followed by strategies for a holistic cybersecurity approach to enhance operational efficiency and resilience.
21.05.2024
Extending NIS and DORA to OT Networks: A Zero Trust Approach
Zero Trust principles effectively secure both IT & OT environments and meet many regulatory requirements (NIS/NIS2, DORA). This approach enhances cyber resilience, protects critical infrastructure, and mitigates cyber threats. Here's how to apply Zero Trust to improve OT network security and compliance!
07.05.2024
Best-of-Breed Done Right
Read about the pros and cons of the multi and single-vendor approaches, why the best-of-breed strategy may be the securest way and how to maximize corporate cybersecurity. Klaus Nemelka touches on various integrations around SIEM, EDR, NDR and more!
22.04.2024
Uncovering Blind Spots: The Crucial Role of NDR in Zero-Day Exploit Detection
How does Network Detection and Response (NDR) massively bolster defenses against zero-day exploits? Learn about the limitations of traditional security measures and how advanced analytics and real-time monitoring detect and mitigate emerging threats, illustrated through a detailed analysis of the Ivanti Connect Secure VPN exploit.
11.04.2024
To Cloud or Not to Cloud
While cloud solutions typically provide high security standards, some prioritize on-premises for full control over security measures, higher performance, reliability independent of internet connectivity, and better customizability, with the decision between the two hinging on factors like budget constraints and regulatory compliance, particularly critical in the financial sector where conducting a comprehensive risk assessment is crucial.
04.04.2024
Look Who Entered Your Library!
Here is all about the XZ Utils and liblzma backdoor and why the best way to foster your security strategy against supply chain attacks and Zero-Day exploits is with an AI-powered Network Detection & Response solution for complete visibility of the network’s communication.
27.03.2024
2024 Allianz Risk Barometer: Heightened Alarm on Cyber Threats
Based on the 2024 Allianz Risk Barometer results, how can you best protect your organization from cyber-attacks? Our Senior Security Consultant describes robust, future-proof cybersecurity measures and why management needs to be involved. One hint: AI!
08.03.2024
How Zero Trust Makes You DORA-Compliant
To strengthen their systems against cyber-attacks, EU financial institutions must meet DORA requirements. One way to efficiently achieve this is by implementing a Zero Trust strategy – here are the 10 key points for your implementation, as well as 5 reasons why ExeonTrace is highly suited to the DORA (and even NIS2!) directives.
20.02.2024
How to Monitor & Stop Supply Chain Attacks
Supply chain attacks, increasingly prevalent and posing significant threats to IT security, target software or hardware suppliers to indirectly infiltrate organizations. Here are 5 ways to prevent these attacks with advanced monitoring technologies like machine learning-based Network Detection & Response (NDR) for early detection and mitigation.
18.01.2024
NIS2 and DORA: Managers Are Liable for Cybersecurity
Manager liability for undetected cybersecurity incidents in Europe varies depending on the legal framework and industry – here, Michael Tullius goes through the corporate requirements and applicable sanctions for DORA and NIS2, as well as how to best comply and ensure long-term security. Cyber-resilience starts here!
20.12.2023
Why Zero Trust and Compliance Go Hand in Hand
Learn how to combine a Zero Trust strategy with compliance regulations such as NIS2, DORA, HIPAA, ISG, GDPR and other relevant standards – a serious task and challenge for companies that want to strengthen their security and ensure compliance with legal requirements. The right choice of cyber security tools can make all the difference.
07.12.2023
Major SOC Mistakes and What You Can Do to Avoid Them
Discover how to strengthen your SOC's defenses by overcoming common deficiencies like incomplete visibility, log analysis challenges, and slow incident response. With advanced analytics, machine learning, and seamless threat intelligence integration, NDR is a comprehensive solution to evolving cyber threats. Is your security team ready for the cyber challenges ahead?
28.11.2023
Enhancing Security Detection: Revolutionizing Risk-Based Alerting
Risk-based alerting (RBA) is a strategy that uses data analysis and prioritization to issue alerts or notifications when potential risks reach certain predefined levels. Find out how to best utilize it for improved security – even against the most advanced attackers.
15.11.2023
Akira Is Not A Game
How do you prevent advanced ransomware such as Akira? Klaus Nemelka explains how machine learning-based network monitoring is the ultimate way to uncover unknown attacks without pre-defined use cases. Read how to detect this new multi-OS ransomware most efficiently.
09.11.2023
Using Behavior Analytics to Detect Changes to your OT Environment
OT communication involves continuous data transmission for device status, differing from IT communication patterns, and are best detectable by Network Detection & Response solutions using machine learning for anomaly detection in network and administrative behavior.
25.10.2023
How to Catch Data Exfiltration with Machine Learning
Find out how to catch data exfiltration thanks to Machine Learning and why detecting it is crucial to your organization’s IT security, as explained by our Head of Professional Services, Andreas Hunkeler.
12.10.2023
A Day in the Life of a Security Engineer
Our Professional Services Engineers explain all about their exciting roles as we are looking to hire an additional PS engineer to protect more and more enterprise networks from cyber threats.
27.09.2023
Why Customers Love ExeonTrace (as a Managed Solution)
Organizations choose managed services for cybersecurity. Providers monitor and manage security systems, while security operations centers (SOC) analyze data and respond to threats.
20.09.2023
Everything EU & Swiss Companies Should Know About DORA (Digital Operational Resilience Act)
The EU Commission's regulation Digital Operational Resilience Act (DORA) was published as a law affecting financial enterprises – read about how it affects Switzerland and the EU, as well as proposed IT security measures.
08.09.2023
The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack
IT security managers rely on Zero Trust, but its practical effectiveness is being challenged by Advanced Persistent Threats worldwide – read about effective security strategies by Klaus Nemelka.
23.08.2023
How NIS2 and ISG Shape Cybersecurity in Switzerland & the EU
Various national and EU-wide regulations have tightened cybersecurity monitoring and reporting requirements for companies. This makes it essential to prioritize the monitoring, detection and reporting of cyber incidents. Read how to achieve compliance and what the ISG (Informationssicherheitsgesetz) requires companies to establish within an ISMS.
08.08.2023
The Key to Hacker Happiness
Klaus Nemelka, Product Manager and Cyber Security Expert, explains how hackers obtained unauthorized access into Microsoft accounts, what malicious activities they operate and how NDR protects organizations from APTs.
26.07.2023
Ransomware Protection: How to Protect Your Business from Cyber Extortion
From all types of ransomware to their devastating impact on businesses, read about how to protect your organization and which solutions keep your network hacker-free.
17.07.2023
How Network Detection & Response (NDR) Monitors OT Environments
Is your OT security really cyber threat proof? Read about the optimal solution against hackers in OT, thanks to metadata analysis and deep packet inspection.
07.07.2023
How to Use ExeonTrace to Detect the Exploitation of Network Device Vulnerabilities
In this article, we share some ideas on how to detect and hunt the exploitation (meaning the abuse) of network device vulnerabilities and how a Network Detection and Response (NDR) supports such analysis.
27.06.2023
Machine Learning Algorithms from a Detection Engineers' Perspective
Besides the general discussion about the benefits and challenges of using machine learning algorithms for threat detection, detection engineers face their own benefits and challenges when building detections. In this blog, these aspects are outlined from a detection engineer's perspective and the corresponding questions that come up during use case development.
02.06.2023
Beyond IT Security: The Central Role of NDR in OT Network Protection
This article highlights the challenges in monitoring OT environments, suggesting that Network Detection and Response (NDR) solutions offer a non-intrusive and effective way to monitor networks by providing comprehensive visibility and detection capabilities without disrupting operations. The advanced machine learning algorithms identify potential threats and anomalies, making this a preferred method for securing OT environments.
05.05.2023
Navigating the Impact of NIS2 on Network Monitoring for Critical Infrastructure: A Comprehensive Guide
The updated Directive on Security of Network and Information Systems (NIS) presents numerous challenges for critical infrastructure operators, particularly in terms of complying with the new requirements and adapting to the evolving cybersecurity landscape. CCO Gregor Erismann provides corporations with critical details about the new EU-wide cybersecurity legislation.
05.04.2023
The Future of Network Security: Predictive Analytics and ML-Driven Solutions
From the role of machine learning driven network security solutions to the benefits of ML within a cybersecurity set-up and concrete examples, Senior Cyber Security Analyst Andreas Hunkeler explains the application of ML and what is yet to come for organisations to detect cyber threats and protect their networks.
24.03.2023
SecIT 2023: An Outlook on a Secure Future
Exeon, alongside partner Netcor GmbH, looks back at a tremendeous IT security event where network security expert Michael Tullius presented to various IT leaders, engineers and SOC personnel on the beneficial deployment of a Network Detection and Response tool.
15.03.2023
Luca Forcellini becomes Senior Channel Manager at Exeon
The Swiss "Network Detection & Response" provider Exeon Analytics is strengthening its market development with Luca Forcellini as Senior Channel Manager. Forcellini is a proven industry expert and was most recently with Boll Engineering, a leading security distributor.
09.03.2023
Exeon in 2023 – Skills, Growth & Challenges
Cybersecurity recruitment and organic growth means excitement and challenges as a new year unfolds: more on the successes and goals from the COO of a fast evolving Swiss network security monitoring organisation.
08.03.2023
Press Release: Exeon Analytics Simplifies Integration of Data Sources
The integration of external data sources into the Network Detection & Response solution ExeonTrace has been significantly simplified thanks to the integration of numerous parsers. The result? An even higher level of visibility across all network activity and data flows.
10.11.2022
EnBW Cyber Security is partnering up with Exeon Analytics for managed service operations in Germany
The Swiss cybersecurity company Exeon Analytics and the German EnBW Cyber Security GmbH have reached an agreement under which EnBW Cyber Security will distribute the Network Detection & Response (NDR) solution ExeonTrace in Germany and use it as a technical solution for the customers of its Security Operation Centre (SOC).
21.10.2022
Exeon wins the PwC Cybersecurity & Privacy Solution of the Year Award
The Swiss security company Exeon Analytics was awarded the Cybersecurity & Privacy Solution of the Year Award sponsored by PwC at the Cyber Security Week in Luxembourg. A high-calibre jury awarded the prize to the Network Detection & Response (NDR) solution ExeonTrace for demonstrating excellence at all levels - from strategy to execution.
18.10.2022
Why Cybersecurity Start-ups are winning the Innovation Race
In almost every industry, start-ups have an innovative edge over larger enterprises. European start-ups, in particular, are excelling as "innovation wunderkinds" in the B2B space. In the cybersecurity industry, scale-ups like Exeon Analytics are setting new standards for innovation-led growth and product development.
22.09.2022
Reliable intrusion prevention even for encrypted network traffic and zero-day attacks
Zurich, September 22, 2022 - With ExeonTrace, the Swiss security company Exeon Analytics offers an intrusion detection solution that goes far beyond the capabilities of traditional intrusion prevention systems (IPS). In particular, ExeonTrace can detect zero-day attacks, against which IPS solutions cannot provide protection due to their signature-based detection. While such systems are suitable for automated detection and defense against known attacks, they must be complemented by other security solutions for comprehensive protection.
30.08.2022
How Network Detection and Response (NDR) Fills the Security Gaps of Intrusion Prevention Systems (IPS)
Intrusion incidents have become very common in recent years, with widescale cyberattacks affecting organisations virtually every week. Threat actors are constantly trying to break into enterprise networks and compromise business assets. To prevent a breach from occurring, many companies employ Intrusion Prevention Systems (IPS). In order to identify and prevent threats, these solutions rely on signature-based detection, which allows for automatic intrusion detection. However, this approach can cause various blind spots and weaknesses in network protection. Network Detection and Response (NDR) can overcome these drawbacks for more reliable and holistic protection against intrusions.
29.08.2022
Exeon: EDR needs NDR for comprehensive security
Swiss security company Exeon Analytics warns against relying only on traditional endpoint detection and response (EDR) solutions to secure endpoints. Numerous endpoints in modern, hybrid networks do not support the agents needed to do so, and where such agents are running, they can potentially be leveraged and disabled by sophisticated attacks. In addition, because of the trend toward home working and BYOD (Bring Your Own Device), IT and security teams often do not have access to privately owned employee endpoints that may also be used by additional family members.
27.07.2022
Exeon revolutionises NDR through metadata analysis
With the analysis of metadata instead of the otherwise common Deep Packet Inspection (DPI), the Swiss cybersecurity company Exeon Analytics is establishing a modernised and future-proof Network Detection & Response (NDR) solution in the European market. The metadata analysis is - in contrast to the established DPI-based procedures - not affected by encrypted data traffic. This is relevant as modern cyber attacks such as APTs, ransomware and lateral movements rely heavily on encrypted communications for attack instructions from remote command and control (C&C) servers
08.06.2022
Exeon recommends consistent monitoring of third-party applications
The Swiss IT security company Exeon Analytics warns against trusting third-party applications unconditionally, regardless of whether they are contract developments or standard solutions from renowned manufacturers. The problem with such applications is that they often require extensive authorisations or receive them unnecessarily. At the same time, such third-party software usually acts as a black box without transparency into the individual actions or data streams.
30.05.2022
Managed Security Services with Ensec and Exeon
Due to complex and distributed IT processes, rising personnel costs and an increasing need for IT security solutions, more and more companies are opting for Managed Security Services (MSS). In this case, an IT service provider takes over the development and operation of a suitable, individually adapted security architecture consisting of individual IT security services. However, there are significant differences between the individual Managed Security Service Providers (MSSP). To better understand what distinguishes the MSS offering of our successful partner Ensec, we asked its CTO Rolf Scheurer for an interview.
25.05.2022
Why Organizations Need Both EDR and NDR for Complete Network Protection
Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use their resources for their day-to-day work. However, they also expand the attack surface and make the organisation vulnerable to malicious cyberattacks and data breaches.
27.04.2022
Ransomware and the Need for NDR to Provide Robust Protection
Ransomware is one of the most worrying cybersecurity threats for organisations worldwide. In February 2022, the Cybersecurity and Infrastructure Security Agency (CISA) issued a Cybersecurity Advisory cautioning organisations against the "increased ransomware threat" in 2022. Without proper security controls in place, any organisation is vulnerable to the catastrophic impact of ransomware attacks.
21.04.2022
Exeon simplifies the deployment of Network Detection and Response
Swiss IT security company Exeon Analytics has enhanced the ExeonTrace NDR platform with cloud connectivity and new anomaly handling functionalities. The latest release significantly simplifies both the deployment and seamless operation of NDR in on-premise, cloud and hybrid environments. Like its predecessors, the current release is completely software-based and, unlike traditional solutions, does not require any additional hardware, reducing not only investments but also operating costs. The evolved architecture of the current version of ExeonTrace allows analysts to tailor the solution to their environment at the click of a button, and provides a flexible platform for deploying sophisticated and high-performance AI algorithms for intelligent detection of current threats, including zero-day exploits.
31.03.2022
Severe vulnerability in the Spring Framework
Compromised servers are likely to be used as relays and as an entry point for various attacks against corporate networks, such as ransomware attacks. Besides relying on ExeonTrace’s automated detection, Exeon’s customers can retrospectively check the network behaviour of potentially vulnerable servers using the “Client server pairs” visualization, as outlined in our previous post on the detection of Log4j. The ExeonTrace NDR solution itself doesn’t use Spring and is therefore unaffected by the vulnerability.
16.03.2022
Third-party cyber risks – and how ExeonTrace can provide complete system transparency
Modern networks have a multitude of third-party systems in use. Consequently, third-party applications have become a security-relevant priority in order to protect one's network. Security teams require complete transparency over their IT/OT network.
23.01.2022
Network Detection & Response establishes itself as central cybersecurity pillar
"Network Detection & Response" has quickly established itself as the leading method for identifying hackers in networks at an early stage, before they cause any damage. Network Detection & Response" is thus becoming an increasingly central pillar of a modern cybersecurity architecture. The Swiss provider Exeon Analytics AG alone has tripled its customer base over the past year.
20.01.2022
Deep Packet Inspection vs. Metadata Analysis of NDR solutions
Today, most Network Detection and Response solutions rely on traffic mirroring and deep packet inspection (DPI). Traffic mirroring is typically deployed on a single core switch to provide a copy of the network traffic to a sensor which uses DPI to thoroughly analyse the payload. While this approach provides detailed analysis, it requires large amounts of processing power and is blind when it comes to encrypted network traffic. Metadata analysis has been specifically developed to overcome these limitations. By utilising metadata for analysis, network communications can be observed at any collection point and be enriched by information providing insights about encrypted communication.
15.12.2021
Threat Hunting and Detection of the Log4j Exploit using the ExeonTrace NDR - Part II
In this blog post, we explain how to work with threatfeeds in ExeonTrace for the detection of devices compromised through the Log4j vulnerability. Our first blog post provides you with more technical background information.
12.12.2021
Threat Hunting and Detection of the Log4j Exploit using the ExeonTrace NDR
The remote code execution vulnerability against Apache Log4j2 [https://nvd.nist.gov/vuln/detail/CVE-2021-44228] is one of the most severe vulnerabilities we have seen for a long time. It’s so severe because the vulnerability is very easy to exploit and the Log4j logging library is used by many Java applications. Thus, one must assume that nearly any larger organization is potentially affected, either due to software developed in-house or via Java software provided by suppliers. After giving some background, we’ll explain how one can identify exploited systems using our ExeonTrace NDR software in this blog post.
10.11.2021
The importance of Diversity in Cybersecurity
Women are significantly underrepresented in cybersecurity. Even though this trend is shifting, today, women only represent about a quarter of the cyber workforce. Considering the explosive growth and consequential talent shortage in cybersecurity, it is crucial to encourage more women into the cyber industry.
20.10.2021
SOC Visibility Triad and the role of NDR solutions
Boosted by the continual advancement of digital technologies, cyberattacks are increasing in number and sophistication. The variety of legacy and modern IT systems in use, the interconnection of appliances (that used to run isolated), and the vast number of third-party suppliers are increasingly challenging to holistically protect the IT landscape.
27.09.2021
Why ExeonTrace is the NDR of choice for CISOs of industry-leading companies across Europe
Corporate IT networks are the foundation of today's information age and protecting them is a crucial element to ensure the proper functioning of IT solutions. As most organisations become heavily dependent on computer networks to facilitate work operations, a disruption in network service can have catastrophic consequences on the affected entity.
08.07.2021
The Importance of an NDR Solution to Early Detect Supply Chain Attacks in Corporate Networks
Digital transformation has witnessed a boost in recent years, especially in the wake of the COVID19 pandemic, which accelerated the adoption of digital technologies by several years in just a few months. Integrating digital technology in business has brought significant benefits. However, it also opened the door wide for new security risks and vulnerabilities.
02.06.2021
NDR: The new pillar of cybersecurity
Prevention and protection are still considered the means of choice when safeguarding one's own IT systems. However, the fact that this approach is not sufficient can now be read almost daily in the media. Current cases such as the attack on Microsoft Exchange, Colonial Pipeline in the United States or, most recently, Siegfried in Switzerland illustrate the dangers: Business interruptions, loss of trust among customers and partners, product defects or legal consequences.
17.05.2021
Next-Gen Network Detection & Response
The average cost of a data breach is a whopping €3.18 million (or $3.86 million at the time of writing this article). As intruders on enterprise networks increased dramatically, it’s now critical to detect and eliminate threats before any real damage is done. This makes robust Network Detection and Response (NDR) vital to cyber security.
05.05.2021
Attack on MS Exchange Server: BSI declares "red" alert for the first time in seven years
Cyber attacks are becoming more frequent and more serious. The most recent example is the worldwide attack on Microsoft's Exchange Server: In March, hackers infiltrated the system via four security holes. This allowed them to log in as administrator without a password and thus read emails or access passwords and devices of their victims in the network. An estimated 250,000 systems were affected - 30 per cent of them in the DACH region. The fact that so many companies in German-speaking countries fell victim to the attack is no coincidence. In many places the necessary security awareness is still lacking.
04.05.2021
Swiss cyber security company Exeon accelerates European Go-to-Market
The Swiss cybersecurity provider Exeon Analytics AG has set itself the goal of becoming the leading "network detection and response" provider in Europe. Well-known investors see the potential of the Swiss solution and support the project with know-how and funds amounting to more than CHF4 million. The ETH spin-off Exeon already has a wide customer base in Switzerland, including two of the five largest Swiss banks and well-known logistics companies. The first major customers have also already been acquired in Germany and Austria.
10.03.2021
How ExeonTrace can help detect the Microsoft Exchange hack
More than hundreds of thousands of Microsoft Exchange servers have been hacked globally, whereas the DACH region seems to be highly affected. This article explains how ExeonTrace can help to detect the intrusion through automated and manual network analysis.
22.12.2020
Detecting the highly evasive Sunburst attack using an (old) ML model
A wide-spread cyber-attack against multiple government agencies, critical infrastructure providers and private sector organizations such as FireEye was made public this December. The attackers breached their victims' IT networks by compromising the software supplier SolarWinds, which allowed them to install a Remote Access Trojan (RAT) through SolarWinds' software update mechanism. In this blog you learn how ML-based detection mechanisms contain such attacks before signatures or Indicators Of Compromise (IOCs) are publicly known.
01.12.2020
XDR – A new weapon in the fight against cyber threats
Today, companies collect huge amounts of security-relevant data for cyber monitoring. But the problem lies in efficiently analyzing this data - especially across different data sources. Extended Detection and Response (XDR) reveal new possibilities with the help of AI.