All
Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have...

a coder inspecting a zero day attack leading to a data breach

The Impact of a Data Breach

Dive into the recent HCA data breach and learn how a zero-day attack can quickly cause damage to your business....

Analyst looking for the MOVEit vulnerability to prevent a cyber attack.

What is the MOVEit Vulnerability and How To Detect It

By now you have probably heard of a vulnerability in MOVEit or its use by the hacking group ClOp. This cyber attack is all...

A desktop, mobile phone and laptop, representing a variety of endpoint security vulnerabilities

Endpoint security stats you need to know

Endpoint security is crucial for protecting your organization from cyber threats. With the increasing vulnerabilities posed by human actions, it’s essential to have key...

Is NetFlow useful for security analysis?

Network flow data (NetFlow, IPFIX, sFlow, etc.) is telemetry data extracted from your network infrastructure. Network Operations teams frequently tap into this data set...

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze...

tobias carlsson dZuNBgA unsplash

Exploring NPMD use cases with the Plixer Platform

When it comes to NPMD, there are an incredibly large number of use cases the Plixer Platform can solve. During my time as a...

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to...

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails...

AdobeStock Editorial Use Only scaled

How cybercriminals are using ML and how to combat it

You and I both know that AI is all the buzz today. Artificial Intelligence (AI) is quickly fueling the evolution of today’s high-octane environment. ...