Zero Day Attacks
Zero-day Exploit Discoveries Hit Record Numbers in 2021
The number of zero-day exploit discoveries hit record numbers in 2021, according to Google Project Zero. Instances of “in-the-wild 0-days” were up nearly double versus 2020, when only 25 0-day exploits were ...

Local U.S. Governments and Municipalities at Risk of Foreign Nation Cyber Attacks
Experts have warned that the Russia-Ukraine conflict poses an unprecedented cyber risk for U.S. organizations as well as State and local governments and municipalities ...

What Does it Mean to Be Zero-Day?
A zero-day vulnerability is an as-yet-unknown computer software vulnerability, that attacks in stealth mode before security teams are aware of its presence. Zero-day is an amorphous concept; it refers to the period ...
Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms
Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that ...
Log4j: the Latest Zero-Day Exploit to Log Jam Cybersecurity
Log4j is the latest example of a zero-day exploit to be discovered and put a big part of the industry into chaos. Given its wide adoption by developers, the impact of the ...

Record-Breaking Zero-Days Require New Approach
We’re facing an application cybersecurity crisis. Today, we’re shipping code faster than we can secure it and that’s left criminals with an offensive advantage. The fix? Move to a more autonomous application ...
Dependence on Log Data | The Limitations, Hidden Costs, and Additive Nature of SIEM
ou may be surprised to learn that log data is proprietary to each security platform vendor. There is no standard format or even a standard labeling mechanism. Your data only has context ...

Dependence on Log Data | An Increasing Vulnerability to Threat Actors
How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM ...

Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them
A hacker’s goal is to identify weaknesses or vulnerabilities in an organization’s IT infrastructure that they can then exploit forRead More The post Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them ...
10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)
While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education ...