SIEM vs. NDR: Who is improving modern SOCs?

SIEM vs NDR - How to improve your SOC with NDR

How Network Detection and Response enhances SOCs with advanced threat detection, cost efficiency, and scalability. Watch the recording on how to extend the effectiveness of your SOC.

How to Monitor & Stop Supply Chain Attacks

How to monitor and detect supply chain attacks - Exeon blog

A supply chain attack is a type of cyberattack that targets the software or hardware supply chain. Instead of directly attacking a target organization, the attacker focuses on compromising the suppliers or vendors associated with the target. This approach allows the attacker to infiltrate the target organization indirectly, often exploiting trust in the supply chain. […]

Cloud Security vs On-Premises

Is on-premises better than cloud security - Exeon

While cloud solutions often offer strong security, some opt for on-prem systems for greater control, performance, offline reliability & more.

Octo2: The Evolution of A Dangerous Malware Family

Octo2 Malware - Exeon Blog

(image generated via DALL·E) The Octo (ExobotCompact) malware family has become the dominant threat in the cyber security landscape. The release of Octo2, an evolved variant, demonstrates the increasing sophistication of modern malware. Octo2 targets Android devices and uses Domain Generation Algorithms (DGA) to generate dynamic Command and Control (C2) servers, making detection much more difficult. […]

Akira Ransomware: How to Protect Your Business

Akira Blog - How the Akira hack could have been prevented

The Akira ransomware group quickly gained notoriety. The group emerged in March 2023 and is already the fourth most active group worldwide. If they keep up with this speed, they will be surpassing Lockbit soon, demanding millions in ransom from its victims. Akira mainly targets companies in various industries, including public, finance, real estate, manufacturing, […]

How to Catch Data Exfiltration with Machine Learning

How to catch data exfiltration - Exeon blog

Why is Detecting Data Exfiltration So Important? In today’s landscape, there is an unprecedented surge in ransomware attacks and data breaches aimed at coercing businesses. Concurrently, the cybersecurity industry is confronted with numerous critical vulnerabilities within database software and corporate websites. These developments paint a grim picture of data exposure and unauthorized data removal that security leaders […]