How to Detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic analysis—providing vital visibility in one of the largest cyberattacks.
Beyond IT Security: OT Network Protection

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing alongside the thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have begun exploiting the frequent lack of detection and protection […]
NIS2 & DORA: Managers Are Liable for Cybersecurity

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which can vary depending on the country and industry. NIS2 (Network and Information Systems Directive 2) and DORA (Digital Operational Resilience Act) are now intended to standardize the specific legal framework and regulations at the European level and provide new guidelines for […]
SOC Visibility Triad & the Role of NDR Solutions

How the SOC Visibility Triad enhances threat detection by combining SIEM, NDR, and EDR for stronger cybersecurity, and what specific aspects are to consider for holistic IT security.
Live the IT/OT Convergence, Enhance Security!

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not exactly new. By integrating different technologies and making them work together efficiently as a single, cohesive system, companies can increase their efficiency, reduce errors, lower costs, improve workflows and achieve measurable competitive advantages. Enterprise IT has long […]
How to Detect the Exploitation of Network Device Vulnerabilities

In this article, we share some ideas on how to detect and hunt the exploitation (meaning the abuse) of network device vulnerabilities and how Network Detection and Response (NDR) supports such analysis. When working in cybersecurity, you are familiar with the following headline: Vulnerability XY on product Z may allow an unauthenticated user to execute unauthorized code […]
Liblzma & XZ Utils Backdoor: What It Means and How to Detect It

All about the XZ utils & liblzma backdoor, and why the best way to foster your security strategy against supply chain attacks and Zero-Days is with AI-powered NDR.
The Future of Network Security: Predictive Analytics & ML-Driven Solutions

As the digital age evolves and continues to shape the business landscape, corporate networks have become increasingly complex and distributed. The amount of data a company collects to detect malicious behaviour constantly increases, making it challenging to detect deceptive and unknown attack patterns and the so-called “needle in the haystack”. With a growing number of […]
Phishing Despite Active MFA

MFA is no longer enough. Attackers use phishing to steal credentials and move laterally—completely undetected. Tools like EDR, XDR & SIEM often miss these threats. Real-time Network Detection & Response and User Entity Behavior Analytics spot suspicious activity before attackers gain control.
secIT: An Outlook on a Secure Future

Pictured above: at the last secIT event, our valued partner NETCOR GmbH supported Exeon at the booth for live demos and strategy discussions. The world of cybersecurity is constantly evolving, and businesses are seeking new and innovative ways to protect their enterprise from cyberthreats. Network Detection and Response (NDR) has become a popular solution for IT leaders […]