Peter Silva covers security for F5’s Technical Marketing Team. Bringing the slightly theatrical and fairly technical together, he covers training, writing, speaking, along with overall product direction and evangelism for F5’s security line.
AI Without the Hype. AI is everywhere these days, and every vendor is claiming magic. But here at Plixer, we’re cutting through the noise.
Join Peter Silva and Plixer Data Scientist Adam Howarth for another Tech Talk in our “No-Fluff AI” series—this time on Behavioral Anomaly Detection, happening Tuesday, May 6th at 9AM Pacific.
We’ll go beyond the buzzwords and talk real AI:
✔️ What behavioral anomaly detection actually is
✔️ Why temporal vectors matter
✔️ How Plixer applies it for real-time network visibility
✔️ And of course—real use cases and tangible benefits for your security operations
Last time we covered Graph AI—this time it’s all about how AI learns and responds to changes in network behavior. If you’re serious about advanced detection, this is for you.
Has the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of data dumped.
LockBit’s own leak site was defaced with a bold message: “Do not crime. Crime is bad.” Alongside that, a massive data dump was exposed — including internal chats, decryption guides, negotiation histories, and even Bitcoin wallet addresses. We’re talking about over 4,400 chats, tools to bypass specific targets, and ransom demands ranging from $4,000 to $150,000.
This breach comes almost exactly one year after Operation Kronos, a major law enforcement effort that previously disrupted LockBit’s operations and led to the arrest of its alleged lead developer. Could this be the final chapter in the LockBit saga?
Not so fast — a new info-stealer gang called Marco Polo has just emerged. The ransomware landscape is always shifting.
🛡️ Looking to bolster your defenses? Check out Plixer’s Field Guide with 23 proven use cases to strengthen your security and network operations. https://www.plixer.com/plixer-field-guide/
https://www.databreachtoday.com/hacker-leaks-stolen-lockbit-ransomware-operation-database-a-28350
https://www.reuters.com/technology/ransomware-group-lockbit-appears-have-been-hacked-analysts-say-2025-05-08/
https://www.darkreading.com/threat-intelligence/lockbit-ransomware-gang-hacked-data-leaked
https://www.databreachtoday.com/marko-polo-inner-workings-global-infostealer-empire-a-28336
🔔 Like, share, and subscribe for more real-world cybersecurity updates!
Graph-based anomaly detection transforms how network operators uncover threats and service issues by providing a deeper, relationship-driven understanding of all network activity traversing the eco-system. Unlike traditional methods that analyze isolated data points or rely on predefined rules, a graph-based approach leverages AI, ML, and graph theory to map and analyze the intricate relationships between users, devices, and services. This increased contextual awareness enables operators to detect nuanced, relational anomalies—such as abnormal lateral movement, unexpected dependencies, or deviations in traffic patterns—that signal early-stage threats, misconfigurations, or service degradation. By analyzing how entities interact rather than just their individual behaviors, graph algorithms offer unparalleled visibility into evolving risks across complex, high-traffic environments. This proactive approach empowers network teams to mitigate threats and performance issues well before they impact security, reliability, or user experience.
Key Takeaways for You:
* Learn how graph theory AI differs from other traditional ML/AI methods
* See practical approaches for constructing graph representations from IPFIX data and applying data science and machine learning models for anomaly detection in real-time
* Participate in the discussion on the importance of network induction in the active modeling of network topologies
What does this mean for you/your business?
* Enhanced Detection Capabilities
* Deeper Insights into traffic
* Proactive Network Management
Practitioners leveraging AI graph-based anomaly detection gain improved visibility into network behaviors, enhancing their capability to respond proactively to security incidents and operational challenges.
The technique empowers network administrators, security analysts, and IT professionals to better understand the underlying relational structure of network data and pinpoint issues before they escalate.
Ransomware attacks may be declining in volume, but for SMBs, the costs—and the consequences—are only rising. The 2025 Sophos Cybercrime on Main Street report reveals that of SMB's impacted:
70% of small business attacks involve ransomware
Over 90% for medium-sized businesses
According to the report, compromised network edge devices, such as firewalls and VPNs, are a common entry point for attackers. With SMEs accounting for 90% of all businesses worldwide and 40% of the US economy, it's crucial to prioritize cybersecurity. We dig into the latest trends, real-world incidents (Marks & Spencer, Co-op UK), and how platforms like Plixer One deliver the visibility, analytics, and control to break the attack cycle.
Let’s talk observability, accountability—and survival.
https://news.sophos.com/en-us/2025/04/16/the-sophos-annual-threat-report-cybercrime-on-main-street-2025/?amp=1
https://www.darkreading.com/cyberattacks-data-breaches/uk-retailers-reeling-ransomware-attacks
AI is everywhere these days, and every vendor is claiming magic. But here at Plixer, we’re cutting through the noise.
Join Peter Silva and Plixer Data Scientist Adam Howarth for another Tech Talk in our “No-Fluff AI” series—this time on Behavioral Anomaly Detection, happening Tuesday, May 6th at 9AM Pacific.
We’ll go beyond the buzzwords and talk real AI:
✔️ What behavioral anomaly detection actually is
✔️ Why temporal vectors matter
✔️ How Plixer applies it for real-time network visibility
✔️ And of course—real use cases and tangible benefits for your security operations
Last time we covered Graph AI—this time it’s all about how AI learns and responds to changes in network behavior. If you’re serious about advanced detection, this is for you.
💡 Bring your questions. Bring your curiosity.
🗓️ Tuesday, May 6 | 9:00AM PT
🔗https://plixer.zoom.us/webinar/register/7017453336482/WN_97Flq66yRrabBjlgHOwXsQ#/registration
The most anticipated data breach report of the year is here: Verizon’s 2025 DBIR. With over 22,000 incidents analyzed, the numbers around system intrusion, vulnerability exploits, ransomware, and supply chain attacks are eye-opening. The 2025 DBIR is packed with critical insights! In its 18th year, this report analyzes 22,000+ cyber incidents, including 12,195 confirmed breaches. From a 36% surge in system intrusions to a 34% rise in vulnerability exploits, and ransomware payouts averaging $115,000, the stats are eye-opening. Learn why 30% of breaches stem from supply chains, how human error fuels 60% of incidents, and why backups and training are non-negotiable.
I'm Peter, and today I’m breaking down the critical takeaways you need to know—from rising ransomware costs to why patching isn't keeping up. Plus, how an Observability and Defense platform like #PlixerOne can help you stay ahead of today’s threats. Like and subscribe for more practical cybersecurity insights!
https://www.verizon.com/business/resources/reports/dbir/#top-takeaways
https://www.verizon.com/business/resources/infographics/2025-dbir-infographic.pdf
https://www.securityweek.com/verizon-dbir-flags-major-patch-delays-on-vpns-edge-appliances/
https://cybersecuritynews.com/verizon-dbir-report-small-businesses-emerges-as-prime-targets/
https://www.infosecurity-magazine.com/news/verizon-dbir-jump-vulnerability/
According to the 2025 Bad Bot Report by Thales and Imperva, malicious bots now make up 37% of all internet traffic, and real human traffic at just 49%! Fueled by AI and LLMs, today’s bots aren’t just scraping data—they’re evading detection, launching API attacks, and mimicking browsers using residential IPs and VPNs.
Industries like travel, retail, and finance are under siege, with bots targeting APIs in 44% of cases. From SQL injections to account takeovers, the tactics are evolving fast. As a business leader, it's essential to stay ahead of these threats and protect your organization's digital assets. You can combat bad bots with real-time monitoring, advanced threat detection and discover the importance of clearing out noise to focus on the really bad activity.
Of course, #PlixerOne can help you cut through the noise to focus on true threats. Get yours at Plixer.com
https://www.imperva.com/resources/resource-library/reports/2025-bad-bot-report/
https://www.scworld.com/news/malicious-bots-now-make-up-more-than-a-third-of-web-traffic
https://www.malwarebytes.com/blog/uncategorized/2025/04/hi-robot-half-of-all-internet-traffic-now-automated