In our first blog, we outlined the challenges of NERC CIP-015-1, which mandates Internal Network Security Monitoring (INSM) within Electronic Security Perimeters (ESPs), exposing the limitations of traditional SIEM, IDS, and NTA tools in SCADA and air-gapped Sensitive Compartmented Information Facilities (SCIFs). Our second blog highlighted the need for an OT-centric approach, introducing MixMode’s Third-Wave […]| MixMode
We explore why an OT-centric approach is critical for addressing CIP-015-1’s unique demands and introduce MixMode’s Third-Wave AI, a transformative solution with origins in SCADA and mechanical engineering.| MixMode
10 insider threat red flags tech companies can't afford to ignore—from shady logins to angry exits. Learn what to watch for before it’s too late.| Blue Headline
The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standard CIP-015-1, effective September 2, 2025, demands a new approach to securing critical infrastructure, exposing the inadequacies of conventional methods.| MixMode
Enter MixMode. The MixMode Platform is a cutting-edge cybersecurity solution that is changing the game in threat detection and prioritization. The MixMode Platform offers a powerful alternative to traditional security tools by leveraging advanced artificial intelligence and a unique data analysis approach.| MixMode
Water and Wastewater Systems are increasingly becoming soft targets for sophisticated cyber attackers. A new joint fact sheet from the EPA and CISA puts this threat front and center, warning utilities about the growing risk of internet-exposed Human Machine Interfaces (HMIs).| MixMode
Improve threat detection, log analysis, and automation with the latest updates in LogRhythm SIEM 7.21.| Exabeam
June 13, 2025: This post was updated to fix an incorrect link. Greetings from the AWS Customer Incident Response Team (AWS CIRT). AWS CIRT is a 24/7, specialized global Amazon Web Services (AWS) team that provides support to customers during active security events on the customer side of the AWS Shared Responsibility Model. We’re excited […]| Amazon Web Services
The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ID’s ESTSAUTH and ESTSAUTHPERSISTENT—to impersonate users.| MixMode
SAP systems are the backbone of enterprise finance—and they’re under attack. As economic pressures rise, so do attempts to exploit financial platforms. From insider threats to ransomware and zero-day vulnerabilities, SAP’s critical role in handling billions of dollars daily makes it a high-value target.| MixMode
Explore the benefits of Microsoft Sentinel for real-time threat detection, seamless integration, and proactive security. The post Why Microsoft Sentinel Is the Next Big Thing in Threat Detection appeared first on GCS Technologies.| GCS Technologies
Artificial intelligence (AI) is transforming industries, but it’s also empowering cybercriminals to launch sophisticated, high-speed cyberattacks. AI-driven attacks, particularly those orchestrated by autonomous AI agents, operate at an accelerated pace, compressing the window for detection and protection.| MixMode
New threat intelligence confirms what many infrastructure leaders have long feared: Chinese state-sponsored threat groups are not only capable of infiltrating U.S. critical systems—they already have.| MixMode
In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform.| MixMode
One of the biggest challenges organizations face today is detecting malicious activity in cloud environments. As highlighted in MixMode’s latest Threat Research Report, cybercriminals are increasingly leveraging trusted cloud providers like AWS, Microsoft Azure, and Google Cloud to disguise their attacks, a strategy known as infrastructure laundering.| MixMode
On April 2, 2025, the NSA, alongside CISA, the FBI, and international allies, sounded the alarm with their “Fast Flux: A National Security Threat” advisory. This isn’t just a technical nuisance—it’s a geopolitical and hacktivist powder keg demanding urgent action.| MixMode
Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools introduce significant security risks—often in ways organizations fail to anticipate.| MixMode
Web browsers have evolved from passive document viewers into complex platforms essential for cloud-based work. But this transformation has also made them a prime target for cyber threats, leaving enterprises and government networks vulnerable.| MixMode
As organizations continue to integrate cloud-based services and third-party applications, OAuth authentication has become a cornerstone of modern security frameworks. However, recent cybersecurity incidents highlight a growing concern: OAuth-based vulnerabilities remain an overlooked entry point for attackers, particularly in Zero Trust environments.| MixMode
While its capabilities are impressive, this development raises significant concerns about the hidden costs and potential security risks associated with its widespread adoption.| MixMode
Gain full network visibility, detect threats in real-time, and stop insider attacks with advanced network monitoring.| Exabeam
Recommended actions for security teams based on revised false positive and true positive definitions and observations.| Exabeam
Use false positive insights to improve cybersecurity programs and evaluate the effectiveness of your tool stack.| Exabeam
Learn how AI and machine learning revolutionize threat detection and response in government agencies.| Government Technology Insider
Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response (EDR) systems.| Help Net Security
Protect your organization more effectively with EclecticIQ's keyword-based watchlists, automating the monitoring process and delivering precise alerts.| blog.eclecticiq.com
Attackers deploying red teaming tool for EDR evasion| Help Net Security