Exeon Helps Joint Blue Team Secure 2nd Place at Locked Shields 2026

Exeon at Locked Shields 2026: Testing NDR where it matters most Organized annually by theย NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Locked Shields is the world’s largest live-fire cyberย defenceย exercise. 41 nations, thousands of participants, and coordinated cyberattacks executed in real time against teams defending critical national infrastructure. There is no safety net. The attacks […]

IoT Security: Closing the Detection Gap

What is IoT Security - Exeon blog

Facing rising cyber risks, industrial infrastructure needs unified defenses: metadata visibility, behavioral detection, and SOC integrationโ€”for true resilience.

SIEM vs. NDR: Who is improving modern SOCs?

SIEM vs NDR - How to improve your SOC with NDR

How Network Detection and Response enhances SOCs with advanced threat detection, cost efficiency, and scalability. Watch the recording on how to extend the effectiveness of your SOC.

(Ab)using DLL Sideloading: How to Detect This Growing Threat

What is DLL Sideloading - Exeon Blog

What is DLL sideloading? DLL sideloading exploits how Windows applications handle Dynamic Link Library (DLL) files. When a program loads a DLL, it searches for the required file in specific directories. Attackers exploit this behavior by placing a malicious DLL in the same directory as the executable and tricking the application into loading the malicious […]

How to Monitor & Stop Supply Chain Attacks

How to monitor and detect supply chain attacks - Exeon blog

A supply chain attack is a type of cyberattack that targets the software or hardware supply chain. Instead of directly attacking a target organization, the attacker focuses on compromising the suppliers or vendors associated with the target. This approach allows the attacker to infiltrate the target organization indirectly, often exploiting trust in the supply chain. […]

Cloud Security vs On-Premises

Is on-premises better than cloud security - Exeon

While cloud solutions often offer strong security, some opt for on-prem systems for greater control, performance, offline reliability & more.

Octo2: The Evolution of A Dangerous Malware Family

Octo2 Malware - Exeon Blog

(image generated via DALLยทE) The Octo (ExobotCompact) malware family has become the dominant threat in the cyber security landscape. The release of Octo2, an evolved variant, demonstrates the increasing sophistication of modernย malware. Octo2 targets Android devices and uses Domain Generation Algorithms (DGA) to generate dynamic Command and Control (C2) servers, making detection much more difficult. […]

Incident Response in Cybersecurity

Incident Response - Why prevention and detection come first

Why Companies Should Focus on Prevention and Detection First Cyberspace threats are constantly increasing, and cyberattacks have considerable financial consequences. The average damage from a data breach in 2024 was around USD 4.88 million, an increase of 10% compared to the previous year (IBM Breach Report 2024). Companies must invest in robust cyber defense; incident […]

Major SOC Mistakes and How You Can Avoid Them

How to avoid SOC mistakes - Exeon cybersecurity blog

For many organizations, an in-house or managed security operations center (SOC) plays a critical role in monitoring and defending against cyber threats. It is essential for organizations because it provides continuous monitoring, rapid threat detection, and effective response to protect against attacks. Its proactive approach enhances cybersecurity by identifying and mitigating potential risks, ensuring the […]

Back to Main Menu
Our Products

Why our NDR solution is superior in the market.

AI & Security
Our Swiss-made, AI cybersecurity platform.