Switzerland’s Security Situation: Hybrid Threats Require Fundamental Defense Strategies

Switzerland’s security environment is becoming more complex from year to year, as reported by the Federal Intelligence Service (FIS) [Nachrichtendienst des Bundes (NDB)] in its annual report โSwiss Security 2024โ. Of particular concern are international terrorism, current military conflicts, and increasing cooperation between various autocracies that cooperate at a political and military level. This development […]
Uncovering Blind Spots: Zero-Day Exploit Detection

Why NDR is crucial to detect zero-day exploits Understanding Zero-Day Exploits Within the realm of cybersecurity, zero-day exploits pose a unique challenge to consumers and vendors alike; how do you identify and mitigate the risks of an unknown vulnerability in real time? These threats exploit vulnerabilities in software, hardware, or protocols that are not yet […]
How to Detect the Microsoft Exchange Hack

This article shows how Exeon helps detect Microsoft Exchange server compromises through automated anomaly detection and manual traffic analysisโproviding vital visibility in one of the largest cyberattacks.
Beyond IT Security: OT Network Protection

Why is Visibility into OT Networks Pivotal? The significance of Operational Technology (OT) for businesses is irrefutable, flourishing alongside the thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have begun exploiting the frequent lack of detection and protection […]
NIS2 & DORA: Managers Are Liable for Cybersecurity

Introduction Manager liability in connection with undetected cybersecurity incidents in Europe is subject to different legal frameworks, which can vary depending on the country and industry. NIS2 (Network and Information Systems Directive 2) and DORA (Digital Operational Resilience Act) are now intended to standardize the specific legal framework and regulations at the European level and provide new guidelines for […]
SOC Visibility Triad & the Role of NDR Solutions

How the SOC Visibility Triad enhances threat detection by combining SIEM, NDR, and EDR for stronger cybersecurity, and what specific aspects are to consider for holistic IT security.
Live the IT/OT Convergence, Enhance Security!

From Data to Defense: How to Better Integrate IT with OT The idea of technological convergence is not exactly new. By integrating different technologies and making them work together efficiently as a single, cohesive system, companies can increase their efficiency, reduce errors, lower costs, improve workflows and achieve measurable competitive advantages. Enterprise IT has long […]
How to Detect the Exploitation of Network Device Vulnerabilities

In this article, we share some ideas on how to detect and hunt the exploitation (meaning the abuse) of network device vulnerabilities and howย Network Detection and Response (NDR)ย supports such analysis. When working in cybersecurity, you are familiar with the following headline: Vulnerability XY on product Z may allow an unauthenticated user to execute unauthorized code […]
Liblzma & XZ Utils Backdoor: What It Means and How to Detect It

All about the XZ utils & liblzma backdoor, and why the best way to foster your security strategy against supply chain attacks and Zero-Days is with AI-powered NDR.
The Future of Network Security: Predictive Analytics & ML-Driven Solutions

As the digital age evolves and continues to shape the business landscape, corporate networks have become increasingly complex and distributed. The amount of data a company collects to detect malicious behaviour constantly increases, making it challenging to detect deceptive and unknown attack patterns and the so-called “needle in the haystack”. With a growing number of […]