Zero-day Exploit Discoveries Hit Record Numbers in 2021

The number of zero-day exploit discoveries hit record numbers in 2021, according to Google Project Zero. Instances of “in-the-wild 0-days” were up nearly double versus 2020, when only 25 0-day exploits were ...
How MixMode Helped a Large US Municipality Detect Bad Actors from Foreign Nation States

Local U.S. Governments and Municipalities at Risk of Foreign Nation Cyber Attacks

Experts have warned that the Russia-Ukraine conflict poses an unprecedented cyber risk for U.S. organizations as well as State and local governments and municipalities ...
zero-day hardware zero-trust prepare

What Does it Mean to Be Zero-Day?

A zero-day vulnerability is an as-yet-unknown computer software vulnerability, that attacks in stealth mode before security teams are aware of its presence.  Zero-day is an amorphous concept; it refers to the period ...
Security Boulevard

Forbes: Comparing Legacy Rules-Based Cybersecurity Platforms And AI-Based Platforms

Chief Scientist and CTO for MixMode, Igor Mezic, wrote this article for Forbes magazine on the advantages of moving away from a legacy rule-based cybersecurity platform to a third-wave AI platform that ...

Log4j: the Latest Zero-Day Exploit to Log Jam Cybersecurity

Log4j is the latest example of a zero-day exploit to be discovered and put a big part of the industry into chaos. Given its wide adoption by developers, the impact of the ...
data discovery supply chain zero-days fuzz appsec

Record-Breaking Zero-Days Require New Approach

We’re facing an application cybersecurity crisis. Today, we’re shipping code faster than we can secure it and that’s left criminals with an offensive advantage. The fix? Move to a more autonomous application ...
Security Boulevard

Dependence on Log Data | The Limitations, Hidden Costs, and Additive Nature of SIEM

ou may be surprised to learn that log data is proprietary to each security platform vendor. There is no standard format or even a standard labeling mechanism. Your data only has context ...
Dependence on Log Data | An Increasing Vulnerability to Threat Actors

Dependence on Log Data | An Increasing Vulnerability to Threat Actors

How sure are you that log files represent the best source of information to base your entire Cybersecurity program upon? Log data is the cornerstone of every traditional cybersecurity platform including SIEM ...
Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them

Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them

A hacker’s goal is to identify weaknesses or vulnerabilities in an organization’s IT infrastructure that they can then exploit forRead More The post Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them ...

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education ...