Ransomware

The History and Current State of Ransomware Attacks

Ransomware uses a variety of attack techniques, including phishing where it can be very difficult for a human to discern whether an email is safe or not. These attacks usually impact the operations of a company immediately, and the recent rise in Ransomware attacks coincides closely with the rise of cryptocurrency as hackers are able to demand payment in untraceable forms like Bitcoin.

The History and Current State of Ransomware Attacks Read More →

What is Killware: How to Protect Yourself from these Next-Generation Cyberattacks

Not long ago, the concept of killware was the stuff of futuristic, doomsday movie fare. The idea that hackers could breach systems related to basic public infrastructure and health services to put people’s very lives at risk seemed scary, but far-fetched. Unfortunately, that dystopian future has, at least to some degree, arrived.

What is Killware: How to Protect Yourself from these Next-Generation Cyberattacks Read More →

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education about the nature of modern data breaches is a great place to start.

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network) Read More →

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks

In partnership with Ravenii, our 60-minute talk was hosted by MixMode’s Head of Sales and Alliances, Geoff Coulehan, CEO of Ravenii, Jeff Shipley, and MixMode’s CTO & Chief Scientist, Igor Mezic. They discussed key topics including:

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks Read More →

SIEM Cannot Detect (and Ignores) Zero-Day Attacks

Organizations are exclusively depending on selective information forwarded to the SIEM. The information that inevitably exists outside the system of record — information relevant for zero-day attacks — is ignored.

SIEM Cannot Detect (and Ignores) Zero-Day Attacks Read More →

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach detection is around six to eight months and how modern, contextually-aware AI overcomes the limitations of traditional cybersecurity solutions.

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks Read More →