newsletter
contact us
LinkedIn

We are here for you!

Contact us.

salutation
We will get back to you as soon as possible.

Exeon Analytics AG

Grubenstrasse 12
CH-8045 Zürich
Switzerland

Blog

Subscribe to our newsletter, we will provide you with updates about our company and relevant news revolving around cyber security.

You want to know what others say about us? Find all news articles on Exeon here.

Subscribe to our newsletter by entering your name and email address below. We will provide you with updates about our company and relevant news revolving around cyber security.

Newsletter

salutation

The Importance of an NDR Solution to Early Detect Supply Chain Attacks in Corporate Networks

Digital transformation has witnessed a boost in recent years, especially in the wake of the COVID19 pandemic, which accelerated the adoption of digital technologies by several years in just a few months. Integrating digital technology in business has brought significant benefits. However, it also opened the door wide for new security risks and vulnerabilities.

more

NDR: The new pillar of cybersecurity

Prevention and protection are still considered the means of choice when trying to safeguard one's own IT systems. However, the fact that this approach is not sufficient can now be read almost daily in the media. 

more

Next-Gen Network Detection & Response

The average cost of a data breach is a whopping €3.18 million (or $3.86 million at the time of writing this article). As intruders on enterprise networks increased dramatically, it’s now critical to detect and eliminate threats before any real damage is done.

more

Attack on MS Exchange Server: BSI declares "red" alert for the first time in seven years

Cyber attacks are becoming more frequent and more serious. The most recent example is the worldwide attack on Microsoft's Exchange Server: In March, hackers infiltrated the system via four security holes. This allowed them to log in as administrator without a password and thus read emails or access passwords and devices of their victims in the network. An estimated 250,000 systems were affected - 30 per cent of them in the DACH region. The fact that so many companies in German-speaking countries fell victim to the attack is no coincidence. In many places, especially in medium-sized businesses, the necessary security awareness is still lacking.

more
Dark image of a computer displaying "Cyber security" in red on a black screen

How ExeonTrace can help detect the Microsoft Exchange hack

More than hundreds of thousands of Microsoft Exchange servers have been hacked globally, whereas the DACH region seems to be highly affected. This Blogpost explains how ExeonTrace can help to detect the intrusion through automated and manual network analysis.

more
Close-up of a hooded man in a black sweatshit holding a smartphone with a computer

Cyberattack on Swiss fintechs: surveillance can prevent fatal consequences

Zurich, February 15, 2021 - Various media are reporting today on a warning from the cybersecurity company Eset. The latter had reported that the hacker group "Evilnum" has been targeting Switzerland fintech companies since December 2020.

more
Closeup picture of the Sun

Blog - Detecting the highly evasive Sunburst attack using an (old) ML model

A wide-spread cyber-attack against multiple government agencies, critical infrastructure providers and private sector organizations such as FireEye was made public this December. The attackers breached their victims’ IT networks by compromising the software supplier SolarWinds, which allowed them to install a Remote Access Trojan (RAT) through SolarWinds’ software update mechanism. In this blog you learn how ML-based detection mechanisms contain such attacks before signatures or Indicators Of Compromise (IOCs) are publicly known.

more
Picture of a kern in front of the sea

Blog - Cyber attacks threaten financial stability

The global financial stability is increasingly at risk through cyber attacks, claims the IMF according to a recent report. The authors argue that cyber attacks become easier to undertake, increasingly sophisticated and, as an effect, much more prevalent.

more
Black and white picture of a spider-web

Blog - XDR: A new weapon in the fight against cyber threats

Today, companies collect huge amounts of security-relevant data for cyber monitoring. But the problem lies in efficiently analyzing this data - especially across different data sources. Extended Detection and Response (XDR) reveal new possibilities with the help of AI.

more
Concrete and brick wall

Blog - Prevention is only half the battle

When a company realizes that its protection concept has failed, it is often already too late. What to do? The Network Detection and Response (NDR) concept offers a new arsenal for cyber defense.

more
Photo montage with a truck, containers and a plane

Supply chain attacks. The open back door into your IT network

Cyber attackers typically exploit a company’s weakest link to break in and steal data or launch a ransomware attack. Thus, the better you protect your company’s IT infrastructure from external intruders, the safer it is, right? Unfortunately, this is not necessarily true, as you can also be at risk through your trusted suppliers.

more
Close-up of stacked data-centers

The timeline of a ransomware attack

The foreign exchange service provider, Travelex, had a very unpleasant start into the New Year. They became one of the latest corporate ransomware victims. A cyber attack usually consists of multiple stages, each of which can take days to months. Let’s use Travelex to explain the timeline of a ransomware attack*

more
Jungle river with small rowing boats

It’s a jungle out there!

Imagine that in the jungle of cyber security, your company's data is the El Dorado for your foes. How would you protect your city of gold?

more
Black and white picture of a person holding a remote

How hackers communicate - DGA

Have you ever flown a drone? It’s not easy to master, but once you are in control, the experience is unique. You reach places which you otherwise wouldn’t and completely change your perspective. However, a good connection between your remote control and the drone is key. Otherwise, you risk crashing the drone and, in the worst case, losing it. 

more
Picture of a woman looking away to a misty mountain landscape

You can’t protect what you can’t see

What is your biggest concern when it comes to the state of your organization’s cybersecurity? In a recently published State of Threat Detection Report, 300 Cyber Security professionals have named automation and visibility as the most significant issues for cybersecurity teams.

more
Dark close-up of a lion roaring

The return of ransomware

Ransomware as a cyber threat is on the rise. Over the summer companies like Meier Tobler, Omya and various German hospitals were affected. Hackers infiltrate businesses through malicious emails, steal and encrypt critical data. Companies are forced to pay a ransom or face the complete loss of their data. The aftermath of an attack can cost companies millions of dollars! While regular data back-ups help to prevent a complete loss, costs related to business interruptions and the risk of having trade secrets revealed should not be underestimated. I strongly recommend to make life hard for every attacker in your system, through a restrictively configured firewall. If you want to know how Exeon helps you to detect holes in your firewall, read the full blogpost or book directly a personal video call.

more