All Network Security
A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global Threat Report highlights a dramatic...

abstract background with coding overlayed ontop of an AI person

ML in the Age of AI – Where ML Fits in Network Security in 2024 and Beyond 

Author: Ryan Mellmer, Plixer Software Engineer The world is currently in an AI (Artificial Intelligence) revolution. AI is everywhere today; in the news, in...

The word malware on a monitor emphasized in a magnifying glass surrounded by code.

Prevent Catastrophic Cyber Attacks: Lessons from 600,000 Routers Compromised by Mystery Malware 

Authors: Stephanie Kille​, Customer Success Manager and Austin Foster, Customer Success Manager Working in cybersecurity we have all seen our fair share of cyber...

Image of screengrabs of various healthcare websites and patient portals

Preventing Data Breaches in Healthcare: How to Gain Control and Efficiency with Ironclad NDR and NPMP from Plixer

Author: Stephanie Kille, Customer Success Manager, Plixer Recent years have seen a disturbing trend of healthcare data breaches, with cybercriminals targeting organizations across the...

gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...

The Essential Role of Network Monitoring in Network Security

Every year, there is a greater number of breach disclosures. Some do so for the first time; for other organizations, it’s the latest in...

Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have...

endpoint security

Endpoint security explained: challenges and best practices for businesses

If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...

jimd

Building a geo attack map with the Scrutinizer API: part 2

So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting....