Zero-day threats

Why Zero-Day Attacks Bypass Traditional Firewall Security: Defending Against Zero-Day’s like Palo Alto Networks CVE-2024-0012

Recently, Palo Alto Networks identified and patched a critical zero-day vulnerability in their next-generation firewalls (NGFWs). This vulnerability, tracked as CVE-2024-0012, allowed attackers to execute code on vulnerable devices remotely. This vulnerability has been actively exploited in attacks dubbed “Operation Lunar Peek.”

Why Zero-Day Attacks Bypass Traditional Firewall Security: Defending Against Zero-Day’s like Palo Alto Networks CVE-2024-0012 Read More →

Alarming Intrusion: Chinese Government Hackers Target US Internet Providers

A recent Washington Post report sent shockwaves through the cybersecurity landscape, revealing that Chinese government-backed hackers have infiltrated at least two major US internet service providers (ISPs) and several smaller ones.

Alarming Intrusion: Chinese Government Hackers Target US Internet Providers Read More →

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack

Zero-day threats continue to wreak havoc on organizations worldwide, with recent attacks targeting corporate and government networks. In the last few weeks, government-sponsored threat actors have targeted Palo Alto Networks and Cisco ASA (Adaptive Security Appliance).

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack Read More →

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn

Hackathon events like Pwn2Own Automotive 2024 play a crucial role in shedding light on zero-day attacks and significantly benefit security teams in several ways. These events bring together talented security researchers, ethical hackers, and industry professionals to uncover and demonstrate vulnerabilities in automotive technologies, including zero-day exploits.

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn Read More →

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it’s so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem.

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023 Read More →

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Hosted by Mark Ehr, Senior Consulting Analyst for 451 Research Advisors and Igor Mezic, Chief Scientist and CTO for MixMode on Tuesday, November 1st at 1pm EST / 10am PST, they will discuss why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats Read More →

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize

Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day and novel threats that are often imperceptible by legacy systems.

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize Read More →

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms

Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that can better detect zero-day threats.

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms Read More →

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams up for failure, especially with tools like SIEM, NDR, and NTA.

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail Read More →

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to protect. Here are a few of the most popular malicious acts:

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond Read More →

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated — many of today’s cybercriminals can easily outsmart a standard SIEM setup.

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats Read More →