SIEM vs. NDR: Who is improving modern SOCs?

How Network Detection and Response enhances SOCs with advanced threat detection, cost efficiency, and scalability. Watch the recording on how to extend the effectiveness of your SOC.
Phishing Despite Active MFA

MFA is no longer enough. Attackers use phishing to steal credentials and move laterally—completely undetected. Tools like EDR, XDR & SIEM often miss these threats. Real-time Network Detection & Response and User Entity Behavior Analytics spot suspicious activity before attackers gain control.
(Ab)using DLL Sideloading: How to Detect This Growing Threat

What is DLL sideloading? DLL sideloading exploits how Windows applications handle Dynamic Link Library (DLL) files. When a program loads a DLL, it searches for the required file in specific directories. Attackers exploit this behavior by placing a malicious DLL in the same directory as the executable and tricking the application into loading the malicious […]
How to Monitor & Stop Supply Chain Attacks

A supply chain attack is a type of cyberattack that targets the software or hardware supply chain. Instead of directly attacking a target organization, the attacker focuses on compromising the suppliers or vendors associated with the target. This approach allows the attacker to infiltrate the target organization indirectly, often exploiting trust in the supply chain. […]
Cloud Security vs On-Premises

While cloud solutions often offer strong security, some opt for on-prem systems for greater control, performance, offline reliability & more.
Octo2: The Evolution of A Dangerous Malware Family

(image generated via DALL·E) The Octo (ExobotCompact) malware family has become the dominant threat in the cyber security landscape. The release of Octo2, an evolved variant, demonstrates the increasing sophistication of modern malware. Octo2 targets Android devices and uses Domain Generation Algorithms (DGA) to generate dynamic Command and Control (C2) servers, making detection much more difficult. […]
Incident Response in Cybersecurity

Why Companies Should Focus on Prevention and Detection First Cyberspace threats are constantly increasing, and cyberattacks have considerable financial consequences. The average damage from a data breach in 2024 was around USD 4.88 million, an increase of 10% compared to the previous year (IBM Breach Report 2024). Companies must invest in robust cyber defense; incident […]
Major SOC Mistakes and How You Can Avoid Them

For many organizations, an in-house or managed security operations center (SOC) plays a critical role in monitoring and defending against cyber threats. It is essential for organizations because it provides continuous monitoring, rapid threat detection, and effective response to protect against attacks. Its proactive approach enhances cybersecurity by identifying and mitigating potential risks, ensuring the […]
Best-of-Breed Done Right

Why a multi-vendor approach is a secure idea What is Best-of-Breed? In the context of cyber security, a best-of-breed approach involves selecting the most effective security tools from different vendors to address specific security needs comprehensively. It aims to achieve optimal performance by combining specialized solutions that excel in their respective areas, thus creating a […]
Allianz Risk Barometer: Heightened Alarm on Cyber Threats

Based on the Allianz Risk Barometer results, how can you best protect your organization from cyber-attacks? Here are robust, future-proof cybersecurity measures and why management needs to be involved.
A Wrap-Up of 07-19

Executive Summary Intro A faulty update published by CrowdStrike caused massive global IT outages last Friday, affecting numerous industries and critical infrastructures. Approximately 8.5 million Windows devices worldwide were impacted, according to Microsoft. Airports, banks, healthcare facilities, and government institutions were significantly affected, with the full extent of the consequences still unknown. Cybercriminals attempted to […]