Zero-day threats

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack

Zero-day threats continue to wreak havoc on organizations worldwide, with recent attacks targeting corporate and government networks. In the last few weeks, government-sponsored threat actors have targeted Palo Alto Networks and Cisco ASA (Adaptive Security Appliance).

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack Read More →

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn

Hackathon events like Pwn2Own Automotive 2024 play a crucial role in shedding light on zero-day attacks and significantly benefit security teams in several ways. These events bring together talented security researchers, ethical hackers, and industry professionals to uncover and demonstrate vulnerabilities in automotive technologies, including zero-day exploits.

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn Read More →

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023

Zero-day attacks are considered the number one cybersecurity threat to company networks large and small. Understand what they are, why it’s so hard to detect them, and how artificial intelligence (AI) is helping to solve this modern problem.

A Proven Strategy For Defending Against Zero-Day Exploits And Attacks — Updated for 2023 Read More →

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats

Hosted by Mark Ehr, Senior Consulting Analyst for 451 Research Advisors and Igor Mezic, Chief Scientist and CTO for MixMode on Tuesday, November 1st at 1pm EST / 10am PST, they will discuss why security analytics needs to include advanced Third-Wave AI, which autonomously learns normal behavior and adapts to constantly changing network environments, to address the next generation of cyberthreats and increase SOC productivity.

Webinar On Demand: Stopping Novel Attacks – Secure Your Business Against Unknown Threats Read More →

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize

Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day and novel threats that are often imperceptible by legacy systems.

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize Read More →

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms

Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that can better detect zero-day threats.

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms Read More →

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams up for failure, especially with tools like SIEM, NDR, and NTA.

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail Read More →

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to protect. Here are a few of the most popular malicious acts:

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond Read More →

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated — many of today’s cybercriminals can easily outsmart a standard SIEM setup.

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats Read More →

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform actions like identifying and stopping a zero-day attack.

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks? Read More →