How to Detect the Microsoft Exchange Hack

How to detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic analysis—providing vital visibility in one of the largest cyberattacks.

Beyond IT Security: OT Network Protection

OT Network Protection - Exeon Cybersecurity Blog

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing alongside the thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have begun exploiting the frequent lack of detection and protection […]

NIS2 & DORA: Managers Are Liable for Cybersecurity

NIS2 and DORA liability - Cybersecurity blog

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which can vary depending on the country and industry. NIS2 (Network and Information Systems Directive 2) and DORA (Digital Operational Resilience Act) are now intended to standardize the specific legal framework and regulations at the European level and provide new guidelines for […]

Live the IT/OT Convergence, Enhance Security!

IT and OT Convergence in Cybersecurity on the Exeon blog

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not exactly new. By integrating different technologies and making them work together efficiently as a single, cohesive system, companies can increase their efficiency, reduce errors, lower costs, improve workflows and achieve measurable competitive advantages. Enterprise IT has long […]

How to Detect the Exploitation of Network Device Vulnerabilities

Detect and hunt the exploitation of network device vulnerabilities

In this article, we share some ideas on how to detect and hunt the exploitation (meaning the abuse) of network device vulnerabilities and how Network Detection and Response (NDR) supports such analysis. When working in cybersecurity, you are familiar with the following headline: Vulnerability XY on product Z may allow an unauthenticated user to execute unauthorized code […]

The Future of Network Security: Predictive Analytics & ML-Driven Solutions

The Future of Network Security

As the digital age evolves and continues to shape the business landscape, corporate networks have become increasingly complex and distributed. The amount of data a company collects to detect malicious behaviour constantly increases, making it challenging to detect deceptive and unknown attack patterns and the so-called “needle in the haystack”. With a growing number of […]

Phishing Despite Active MFA

Phishing and lateral movement - Exeon cybersecurity blog

MFA is no longer enough. Attackers use phishing to steal credentials and move laterally—completely undetected. Tools like EDR, XDR & SIEM often miss these threats. Real-time Network Detection & Response and User Entity Behavior Analytics spot suspicious activity before attackers gain control.

secIT: An Outlook on a Secure Future

secIT cybersecurity event - Exeon blog

Pictured above: at the last secIT event, our valued partner NETCOR GmbH supported Exeon at the booth for live demos and strategy discussions. The world of cybersecurity is constantly evolving, and businesses are seeking new and innovative ways to protect their enterprise from cyberthreats. Network Detection and Response (NDR) has become a popular solution for IT leaders […]