In my 2024 article, Cyber Security 2024: Key Trends Beyond the Hype, I aimed to stay rational and avoid hype—especially around AI—and pointed out that most real-world attacks still involved unpatched systems, weak credentials, and social engineering. Over the past...
Why Prevention Isn’t Enough: How a Second Line of Defense Protects Your Business
According to recent reports, cyberattacks rose by 75% in the third quarter of 2024 compared to the same period in the previous year and by 15% compared to the second quarter of 2024. This alarming trend clearly shows that companies are more than ever required to...
Streamlining SOC Operations with THOR Cloud: Revolutionizing Remote Forensic Analysis
Security Operations Centers (SOCs) face increasing challenges in defending against sophisticated cyber threats, often compounded by resource limitations. Analyzing large volumes of forensic data to detect indicators of compromise (IoCs) can be a labor-intensive task....
THOR Evolution: THOR 10.7 Stable Release and the Approach of 11 TechPreview
We are excited to announce that THOR 10.7 will become the new default scanner version for ASGARD users starting Thursday, November 28th, 2024. This update introduces significant performance enhancements, including faster scan times, improved archive handling, and...
Cybersecurity is Not a Solo Endeavor – A Recap of it-sa Expo&Congress 2024
Explore key takeaways from it-sa 2024 and learn how a collaborative approach to cybersecurity is essential for building resilient defenses.
Introducing @NextronResearch: A New Channel for Threat Intelligence
As part of our commitment to sharing valuable threat intelligence and detection insights, we're excited to announce the launch of a dedicated Twitter account for Nextron Research: @nextronresearch. This account will be our team's platform for sharing detailed...
In-Depth Analysis of Lynx Ransomware
Introduction Lynx ransomware is a newly emerged and sophisticated malware threat that has been active since mid-2024. Lynx ransomware has claimed over 20 victims across a range of industries. Once it infiltrates a system, it encrypts critical files, appending a...
Introducing THOR Cloud: Next-Level Automated Compromise Assessments
Since the launch of THOR Cloud Lite in September, our team has been dedicated to developing a more powerful version of THOR Cloud that incorporates the full scanner with its extensive suite of forensic modules and expansive detection signature database. Today, we are...
Cybersecurity is Not Just an IT Security Issue
Interview with Marc Hirtz, CEO of the Cybersecurity Provider Nextron Systems The Network and Information Security (NIS2) Directive of the European Union represents a significant step toward strengthening cybersecurity within the EU. It targets organizations classified...
Announcing the Launch of ASGARD Analysis Cockpit v4.1
We are excited to announce the release of ASGARD Analysis Cockpit v4.1, a substantial upgrade from version 4.0. This latest version introduces significant improvements and new features designed to enhance performance, usability, and stability. ASGARD Analysis Cockpit...
Detecting Web Shells: Why it is important to add an additional layer of protection on your existing security solutions
Understanding the importance of web shell detection is crucial in today’s cybersecurity landscape. Traditional antivirus solutions often fall short, but specialized tools like Nextron’s THOR APT scanner provide advanced protection against these stealthy threats, ensuring comprehensive security.
THOR’s Power Unleashed: Multi-Threading for the Masses
We're excited to announce a significant update to THOR, our comprehensive digital forensic scanner, which now extends multi-threading capabilities to both the standard version and THOR Lite. Previously exclusive to our forensic lab license holders, this enhancement...