zero-day attack

Alarming Intrusion: Chinese Government Hackers Target US Internet Providers

A recent Washington Post report sent shockwaves through the cybersecurity landscape, revealing that Chinese government-backed hackers have infiltrated at least two major US internet service providers (ISPs) and several smaller ones.

Alarming Intrusion: Chinese Government Hackers Target US Internet Providers Read More →

Critical Microsoft Zero-Day Vulnerability Exploited in the Wild for Over a Year

A severe zero-day vulnerability in Microsoft Windows, tracked as CVE-2024-38112, has been actively exploited by threat actors for at least 18 months. This security flaw in the Windows MSHTML Platform allows remote code execution, potentially compromising numerous organizations worldwide.

Critical Microsoft Zero-Day Vulnerability Exploited in the Wild for Over a Year Read More →

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack

Zero-day threats continue to wreak havoc on organizations worldwide, with recent attacks targeting corporate and government networks. In the last few weeks, government-sponsored threat actors have targeted Palo Alto Networks and Cisco ASA (Adaptive Security Appliance).

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack Read More →

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn

Hackathon events like Pwn2Own Automotive 2024 play a crucial role in shedding light on zero-day attacks and significantly benefit security teams in several ways. These events bring together talented security researchers, ethical hackers, and industry professionals to uncover and demonstrate vulnerabilities in automotive technologies, including zero-day exploits.

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn Read More →

Evolving Role of the CISO: From IT Security to Business Resilience

With more and more large organizations relying on technology to conduct business, the need for a skilled CISO has become increasingly important. No longer just overseeing IT security efforts, the CISO is now responsible for a wide range of cyber defenses from data protection to compliance and even physical security.

Evolving Role of the CISO: From IT Security to Business Resilience Read More →

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it’s so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem.

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023 Read More →

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Hosted by Mark Ehr, Senior Consulting Analyst for 451 Research Advisors and Igor Mezic, Chief Scientist and CTO for MixMode on Tuesday, November 1st at 1pm EST / 10am PST, they will discuss why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats Read More →

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout

In the report, 451 Research explains why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

451 Research Finds Self-Learning Technology to Address Cybersecurity Blind Spots and Reduce Analyst Burnout Read More →

Case Study: How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses

In our newest case study, “How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses,” we share how the City cut its cyber tool footprint in half, gained visibility into advanced foreign adversary attacks, and greatly improved the productivity of its SOC staff.

Case Study: How a Major U.S. City Rapidly Modernized Its Cybersecurity Defenses Read More →

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize

Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day and novel threats that are often imperceptible by legacy systems.

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize Read More →

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms

Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that can better detect zero-day threats.

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms Read More →

Dependence on Log Data | An Increasing Vulnerability to Threat Actors

How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM (Security Information and Event Management), UEBA (User and Entity Behavior Analytics), and xDR (Detection and Response).

Dependence on Log Data | An Increasing Vulnerability to Threat Actors Read More →