News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

With AI-based NDR against ransomware
With AI-based NDR against ransomware

Ransomware threats are constantly increasing and evolving. AI-supported NDR (Network Detection and Response) systems can keep up better and therefore offer more protection. According to the Swiss security company Exeon Analytics, with the emergence of the Akira ransomware, large companies in particular and those tied to Kritis or NIS 2 are facing a new danger, as there is currently no decryptor for the current versions of the malware and the new group is mainly focuses on victims from whom it can extort large ransoms. According to Erismann, many SIEM systems (Security Information and Event Management) offer...

Read more

Identity and Access Management (IAM) alone is not enough
Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM. Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because...

Read more

Defend Storm-0558 attacks with machine learning
B2B Cyber ​​Security ShortNews

Cybersecurity systems based on machine learning identify attacks by detecting deviations from normality. According to security specialists at Exeon, this could have prevented the attack by the APT group Storm-0558. According to the Swiss security specialists at Exeon, the attack by the suspected Chinese hacker group Storm-0558 on a large number of government agencies and other organizations could have been prevented. The attackers had stolen a signing key from Microsoft. They were then able to use this to issue working access tokens for Outlook Web Access (OWA) and Outlook.com and hack emails and their attachments. An error in the…

Read more

Solutions: From NIS to NIS2
From NIS to NIS2

NIS2 involves many more companies than NIS, better known as KRITIS. The change is a challenge for many. New technologies, such as NDR – Network Detection and Response, solve many requirements for companies. According to Swiss cybersecurity specialist Exeon Analytics, the version of the NIS Directive updated by the European Commission in January 2023, referred to as NIS2, has a significant impact on the way organizations belonging to the so-called critical infrastructures operate , manage and monitor their networks. NIS2 aims to increase resilience and responsiveness…

Read more

ML helps detect anomalies
B2B Cyber ​​Security ShortNews

Many security teams still rely on static signatures to detect threats. They either rely on an intrusion detection system (IDS) for network analysis or on static behavioral detections based on endpoint logs. But with more and more data, it becomes difficult to keep track and cover all sources and attack patterns with individual rules. To overcome these challenges, Exeon says machine learning (ML) algorithms help change the perspective of detection development. Anyone who uses ML can learn the normal state of communication, recognize deviations and...

Read more

Intrusion prevention even with encrypted network traffic
Intrusion prevention even with encrypted network traffic NDR

A reliable IPS - Intrusion Prevention System should also protect against encrypted network traffic and zero-day attacks. However, since many solutions work with signature-based detection, they cannot usually protect against zero-day attacks. The new NDR from ExeonTrace does IPS at the same time. With ExeonTrace, the Swiss security company Exeon Analytics offers a solution for detecting intruders that goes far beyond the capabilities of conventional intrusion prevention systems (IPS). In particular, ExeonTrace can also detect zero-day attacks, against which IPS solutions cannot offer any protection due to their signature-based detection. Such systems are suitable...

Read more

EDR without NDR with weaknesses in protection
EDR without NDR with weaknesses in protection

The Swiss security company Exeon Analytics warns against only relying on conventional EDR solutions (Endpoint Detection & Response) when securing endpoints. Because the agent software does not always run at the end point, which creates weaknesses in the defense network. Many endpoints in modern, hybrid networks do not support the agents required for this, and where such agents are running, they can be undermined and deactivated by sophisticated attacks. Also, because of the trend towards working from home and BYOD (Bring Your Own Device), IT and security teams often don't have access to privately owned endpoints...

Read more

NDR push by analyzing metadata 
NDR push by analyzing metadata

With the analysis of metadata instead of the usual Deep Packet Inspection (DPI), the Swiss cybersecurity company Exeon Analytics is establishing a modernized and future-proof Network Detection & Response (NDR) solution in the European market. In contrast to the established methods based on DPI, the metadata analysis is not affected by encrypted data traffic. This is relevant as modern cyber attacks such as APTs, ransomware and lateral movements rely heavily on encrypted communication for attack instructions from remote command and control servers (C&C). Encrypted metadata catches the eye Traditional NDR solutions typically detect such processes using comprehensive data analysis,…

Read more