Saturday, May 24, 2025

Phishing Scams Just Leveled Up with a Scary Microsoft O365 Attack

 

Phishing scams have just taken a major leap forward in terms of sophistication and complexity. Earlier this year, security firm Fortra observed a highly advanced phishing attack that combined multiple technologies to steal Microsoft O365 credentials. This attack used an.htm file with AES encryption, a content delivery network, and a node package manager to deliver the malicious code. What's even more alarming is that this is the first time these tactics have been seen used together in a phishing attack. The abuse of open-source repositories like npm is also a well-known threat to organizations, and this attack highlights the importance of being vigilant about email attachments and using network telemetry to detect unusual connections. To defend against these types of attacks, user training is crucial, and using an Observability and Defense Platform like PlixerOne can help you keep an eye on any new or unusual connections to CDNs or node manager packages. Join me as I break down this sophisticated phishing attack and provide tips on how to protect yourself and your organization. Don't forget to like, share, and subscribe for more cybersecurity news and updates! https://www.fortra.com/blog/threat-analysis-malicious-npm-package-leveraged-o365-phishing-attack https://www.darkreading.com/threat-intelligence/novel-phishing-attack-combines-aes-npm-packages https://www.darkreading.com/threat-intelligence/evolving-npm-package-campaign-roblox-devs

Tuesday, May 20, 2025

Why Your MTTR Is Too Slow — And How to Fix It Fast


 

SLASH YOUR MTTR! Join Us for a Live Webinar on Faster Incident Response & Reduced Downtime. MTTR (Mean Time to Response) isn't just a buzzword — it’s a crucial metric that can make or break your organization's ability to bounce back from incidents quickly. But here's the thing: most teams misunderstand what MTTR really means. It’s not just about reacting fast. It’s about gaining the right insights, at the right time, so you can act decisively before things escalate. This Thursday, May 22nd at 9:00AM PT, join us for a live session: "Beyond Recovery: How Faster Incident Response Reduces MTTR." Plixer Data Scientist Adam Howarth will walk you through: ✅ What MTTR really measures (and why most teams get it wrong) ✅ How network data + AI can elevate your visibility and expertise ✅ Real-world examples of organizations slashing downtime ✅ Best practices to speed up incident response for NetOps and SecOps teams If you're responsible for uptime, security, or operational performance, this is a must-attend session. 👉 Register now: https://plixer.zoom.us/webinar/register/WN_kILvZpyQR2W8OVvthqVEtg#/registration ...and take your MTTR from sluggish to streamlined. 💬 Drop your questions in the comments before the session, and we might answer them live. 🔔 Don’t forget to like, subscribe, and hit the bell so you never miss a critical tech insight.

Wednesday, May 14, 2025

Tech Talk: Behavioral Anomaly Detection Explained

 


AI Without the Hype. AI is everywhere these days, and every vendor is claiming magic. But here at Plixer, we’re cutting through the noise. Join Peter Silva and Plixer Data Scientist Adam Howarth for another Tech Talk in our “No-Fluff AI” series—this time on Behavioral Anomaly Detection, happening Tuesday, May 6th at 9AM Pacific. We’ll go beyond the buzzwords and talk real AI: ✔️ What behavioral anomaly detection actually is ✔️ Why temporal vectors matter ✔️ How Plixer applies it for real-time network visibility ✔️ And of course—real use cases and tangible benefits for your security operations Last time we covered Graph AI—this time it’s all about how AI learns and responds to changes in network behavior. If you’re serious about advanced detection, this is for you.

Sunday, May 11, 2025

Did LockBit Just Get Locked Out? The Walmart of Ransomware's Massive Leak

 


Has the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of data dumped. LockBit’s own leak site was defaced with a bold message: “Do not crime. Crime is bad.” Alongside that, a massive data dump was exposed — including internal chats, decryption guides, negotiation histories, and even Bitcoin wallet addresses. We’re talking about over 4,400 chats, tools to bypass specific targets, and ransom demands ranging from $4,000 to $150,000. This breach comes almost exactly one year after Operation Kronos, a major law enforcement effort that previously disrupted LockBit’s operations and led to the arrest of its alleged lead developer. Could this be the final chapter in the LockBit saga? Not so fast — a new info-stealer gang called Marco Polo has just emerged. The ransomware landscape is always shifting. 🛡️ Looking to bolster your defenses? Check out Plixer’s Field Guide with 23 proven use cases to strengthen your security and network operations. https://www.plixer.com/plixer-field-guide/ https://www.databreachtoday.com/hacker-leaks-stolen-lockbit-ransomware-operation-database-a-28350 https://www.reuters.com/technology/ransomware-group-lockbit-appears-have-been-hacked-analysts-say-2025-05-08/ https://www.darkreading.com/threat-intelligence/lockbit-ransomware-gang-hacked-data-leaked https://www.databreachtoday.com/marko-polo-inner-workings-global-infostealer-empire-a-28336 🔔 Like, share, and subscribe for more real-world cybersecurity updates!

Wednesday, May 7, 2025

Tech Talk- AI Engine: A look at Transformative AI for Deep Insight into Anomalous Traffic

 


Graph-based anomaly detection transforms how network operators uncover threats and service issues by providing a deeper, relationship-driven understanding of all network activity traversing the eco-system. Unlike traditional methods that analyze isolated data points or rely on predefined rules, a graph-based approach leverages AI, ML, and graph theory to map and analyze the intricate relationships between users, devices, and services. This increased contextual awareness enables operators to detect nuanced, relational anomalies—such as abnormal lateral movement, unexpected dependencies, or deviations in traffic patterns—that signal early-stage threats, misconfigurations, or service degradation. By analyzing how entities interact rather than just their individual behaviors, graph algorithms offer unparalleled visibility into evolving risks across complex, high-traffic environments. This proactive approach empowers network teams to mitigate threats and performance issues well before they impact security, reliability, or user experience. Key Takeaways for You: * Learn how graph theory AI differs from other traditional ML/AI methods * See practical approaches for constructing graph representations from IPFIX data and applying data science and machine learning models for anomaly detection in real-time * Participate in the discussion on the importance of network induction in the active modeling of network topologies What does this mean for you/your business? * Enhanced Detection Capabilities * Deeper Insights into traffic * Proactive Network Management Practitioners leveraging AI graph-based anomaly detection gain improved visibility into network behaviors, enhancing their capability to respond proactively to security incidents and operational challenges. The technique empowers network administrators, security analysts, and IT professionals to better understand the underlying relational structure of network data and pinpoint issues before they escalate.

Saturday, May 3, 2025

Ransomware Rinse & Repeat: Why SMBs Are in the Crosshairs in 2025

 


Ransomware attacks may be declining in volume, but for SMBs, the costs—and the consequences—are only rising. The 2025 Sophos Cybercrime on Main Street report reveals that of SMB's impacted: 70% of small business attacks involve ransomware Over 90% for medium-sized businesses According to the report, compromised network edge devices, such as firewalls and VPNs, are a common entry point for attackers. With SMEs accounting for 90% of all businesses worldwide and 40% of the US economy, it's crucial to prioritize cybersecurity. We dig into the latest trends, real-world incidents (Marks & Spencer, Co-op UK), and how platforms like Plixer One deliver the visibility, analytics, and control to break the attack cycle. Let’s talk observability, accountability—and survival. https://news.sophos.com/en-us/2025/04/16/the-sophos-annual-threat-report-cybercrime-on-main-street-2025/?amp=1 https://www.darkreading.com/cyberattacks-data-breaches/uk-retailers-reeling-ransomware-attacks

Thursday, May 1, 2025

AI Without the Hype: Behavioral Anomaly Detection Explained | Join Us May 6!

 


AI is everywhere these days, and every vendor is claiming magic. But here at Plixer, we’re cutting through the noise. Join Peter Silva and Plixer Data Scientist Adam Howarth for another Tech Talk in our “No-Fluff AI” series—this time on Behavioral Anomaly Detection, happening Tuesday, May 6th at 9AM Pacific. We’ll go beyond the buzzwords and talk real AI: ✔️ What behavioral anomaly detection actually is ✔️ Why temporal vectors matter ✔️ How Plixer applies it for real-time network visibility ✔️ And of course—real use cases and tangible benefits for your security operations Last time we covered Graph AI—this time it’s all about how AI learns and responds to changes in network behavior. If you’re serious about advanced detection, this is for you. 💡 Bring your questions. Bring your curiosity. 🗓️ Tuesday, May 6 | 9:00AM PT 🔗https://plixer.zoom.us/webinar/register/7017453336482/WN_97Flq66yRrabBjlgHOwXsQ#/registration

Tuesday, April 29, 2025

The 2025 Verizon Data Breach Report: What You Need to Know


 The most anticipated data breach report of the year is here: Verizon’s 2025 DBIR. With over 22,000 incidents analyzed, the numbers around system intrusion, vulnerability exploits, ransomware, and supply chain attacks are eye-opening. The 2025 DBIR is packed with critical insights! In its 18th year, this report analyzes 22,000+ cyber incidents, including 12,195 confirmed breaches. From a 36% surge in system intrusions to a 34% rise in vulnerability exploits, and ransomware payouts averaging $115,000, the stats are eye-opening. Learn why 30% of breaches stem from supply chains, how human error fuels 60% of incidents, and why backups and training are non-negotiable.

I'm Peter, and today I’m breaking down the critical takeaways you need to know—from rising ransomware costs to why patching isn't keeping up. Plus, how an Observability and Defense platform like #PlixerOne can help you stay ahead of today’s threats. Like and subscribe for more practical cybersecurity insights! https://www.verizon.com/business/resources/reports/dbir/#top-takeaways https://www.verizon.com/business/resources/infographics/2025-dbir-infographic.pdf https://www.securityweek.com/verizon-dbir-flags-major-patch-delays-on-vpns-edge-appliances/ https://cybersecuritynews.com/verizon-dbir-report-small-businesses-emerges-as-prime-targets/ https://www.infosecurity-magazine.com/news/verizon-dbir-jump-vulnerability/

Saturday, April 19, 2025

Bad Bots are Blossoming Bigger than Ever

 


According to the 2025 Bad Bot Report by Thales and Imperva, malicious bots now make up 37% of all internet traffic, and real human traffic at just 49%! Fueled by AI and LLMs, today’s bots aren’t just scraping data—they’re evading detection, launching API attacks, and mimicking browsers using residential IPs and VPNs. Industries like travel, retail, and finance are under siege, with bots targeting APIs in 44% of cases. From SQL injections to account takeovers, the tactics are evolving fast. As a business leader, it's essential to stay ahead of these threats and protect your organization's digital assets. You can combat bad bots with real-time monitoring, advanced threat detection and discover the importance of clearing out noise to focus on the really bad activity. Of course, #PlixerOne can help you cut through the noise to focus on true threats. Get yours at Plixer.com https://www.imperva.com/resources/resource-library/reports/2025-bad-bot-report/ https://www.scworld.com/news/malicious-bots-now-make-up-more-than-a-third-of-web-traffic https://www.malwarebytes.com/blog/uncategorized/2025/04/hi-robot-half-of-all-internet-traffic-now-automated

Saturday, April 12, 2025

What Are Email Bombs? The Sneaky Scam Hiding in Your Inbox


 Email spam is nothing new—but a dangerous twist is making it past filters and putting users at risk. Forget basic spam. “Email bombs” are the latest trick cybercriminals use to flood inboxes, disguise attacks, and socially engineer users into giving up access. In this video, we break down how “email bombs” work, how attackers use them as a smokescreen for phishing and social engineering, and what you can do to defend your network. From user awareness to anomaly detection with tools like Plixer One, here's how to stay ahead of this growing threat.

Don’t forget to like and subscribe for more network security insights! https://www.darkreading.com/cyberattacks-data-breaches/threat-actors-spam-bombing-malicious-motives https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/email-bombing-why-you-need-to-be-concerned/ https://www.signifyd.com/blog/email-bomb-spam-attacks/

Friday, April 11, 2025

Don't Get Caught in the Flux: DNS Back in the Spotlight with the Fast Flux Threat

 


Imagine a world where you have to remember dozens of number combinations just to access your favorite websites. Luckily, the Domain Name System (DNS) translates domain names into IP addresses, making it easy to navigate the internet. However, DNS is also a prime target for cybercriminals, with threats like DNS spoofing, amplification attacks, and the latest Fast Flux DNS tactic. This week, CISA issued a warning about Fast Flux DNS, a sneaky tactic used by cybercriminals to stay hidden and resilient. In this video, we'll break down what Fast Flux DNS is (single and double flux), how attackers constantly rotate IP addresses and name servers to evade detection, and most importantly, how you can protect your DNS systems from these threats. Learn how Plixer One’s Observability & Defense Platform helps you detect and stop DNS abuse fast. So yeah, you don’t have to give a flux… but you kinda should. Learn about #PlixerOne: Plixer.com https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-093a https://www.csoonline.com/article/3954873/cyber-agencies-urge-organizations-to-collaborate-to-stop-fast-flux-dns-attacks.html https://www.bleepingcomputer.com/news/security/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/ https://www.darkreading.com/cyber-risk/cisa-dns-trick-fast-flux-thriving

New Ransomware Alert! VanHelsing RaaS is Here & It’s Nasty!


 

Van Helsing isn’t just a vampire hunter anymore—it’s the latest Ransomware-as-a-Service (RaaS) wreaking havoc since launching on March 7th. This highly sophisticated, multi-platform malware has already claimed three victims, targeting Windows, Linux, BSD, ARM, and even ESXi. With an easy-to-use console, cybercriminals can launch attacks effortlessly. Wanna join the dark side? Pay a $5,000 entry fee or get in free if you’re already a known threat actor. Affiliates keep 80% of the bounty, while VanHelsing’s "corporate office" takes 20%—and with ransoms hitting $500,000, this ransomware is a serious threat to individuals and organizations alike. The real danger? VanHelsing deletes shadow copies, making recovery nearly impossible. 💡 How to protect yourself? ✅ Stay patched 🔄 ✅ Have offsite backups 📀 ✅ Use strong endpoint security 🔒 ✅ Deploy Plixer One for early detection & defense! 🛡️ Learn how to defend against VanHelsing RaaS and how Plixer One can help detect and mitigate these growing ransomware threats. Plixer.com Thanks to Check Point Software for the great screengrabs and analysis. https://research.checkpoint.com/2025/vanhelsing-new-raas-in-town/ #CyberSecurity #Ransomware #VanHelsingRaaS #PlixerOne #InfoSec #CyberAttack #Malware #ThreatDetection

Beware of ClickFix: A Clever Way to Infect Your Computer

 


A new type of attack, known as ClickFix, has been gaining traction in 2024, using clever social engineering tactics to trick users into installing info-stealing malware. By posing as a legitimate update or patch, ClickFix manipulates users into running malicious PowerShell scripts that deploy the Lumen infostealer — grabbing usernames, passwords, crypto wallets, and more! Learn how to spot and protect yourself from this growing threat and if you didn't know, #PlixerOne can help detect and help mitigate these attacks. Don't fall for the trap — stay sharp and stay safe! Plixer.com https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/ https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/

Medusa Ransomware: The Modern Monster That's Petrifying Critical Infrastructure

 


    In Greek mythology, Medusa could turn you to stone with just one look—but today, Medusa ransomware is freezing organization's critical infrastructure and holding them hostage with a 48-hour deadline to pay. This dangerous malware has already impacted over 300 victims with a nasty double extortion scheme: encrypting data, stealing it, and threatening to expose it unless a ransom is paid within 48 hours. Medusa gets in through phishing attacks and unpatched vulnerabilities, then switches to legitimate tools like PowerShell for stealthy lateral movement.

To protect yourself from this snake-like threat: * Stay up to date on patching * Implement multifactor authentication * Monitor unusual RDP activity * Keep OT operations segmented An Observability and Defense System like Plixer One helps you see more, know more, and take action against cyber threats. Don’t let Medusa catch you off guard! Learn more: Plixer.com https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a https://www.infosecurity-magazine.com/news/cisa-fbi-warn-medusa-ransomware/ https://www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-alarmed-medusa-ransomware-attacks-grow

Are You a Leader or a Lagger with Software Security?

 

The 2025 State of Software Security Report from Veracode and the Cyentia Institute is here, and the results are eye-opening! Now in its 15th year, this report measures security maturity—the ability to find and fix software vulnerabilities that reduce business risk. Some Key Findings: ✔️ Security leaders fix vulnerabilities in 5 weeks or less, while laggers take up to a year ✔️ Days to fix vulnerabilities increased by 47% ✔️ Critical vulnerabilities are up 181%, largely due to third-party supply chain risks ✔️ 63% of organizations now pass OWASP Top 10 compliance—double from a decade ago! How Can You Stay Ahead? ✅ Shift security left in the SDLC ✅ Improve visibility across your infrastructure ✅ Contextualize and prioritize vulnerabilities for a faster response https://www.veracode.com/wp-content/uploads/2025/02/State-of-Software-Security-2025.pdf https://www.veracode.com/blog/state-of-software-security-maturity-2025/ https://www.cyentia.com/the-year-of-maturity-and-risk-based-resilience/ And yes—Plixer One can help with that! Learn more: Plixer.com 📊 If you love charts, graphs, and data-driven insights, this report is packed with them.

Healthcare in the Crosshairs of Ransomware

 


A recent Microsoft study found that nearly 400 healthcare organizations were impacted by ransomware in 2024. The financial toll is staggering—$4.4 million average ransom demand and $1 million in recovery costs per incident. Institutions like New York Blood Center and Frederick Health have already been affected, reinforcing the urgency of robust cybersecurity measures. Red Piranha’s 2024 Threat Intelligence Report shows an 80% increase in ransomware attacks over the past two years, and LockBit 3.0 has reclaimed the #1 spot despite prior disruptions. 💡 What does this mean for 2025? Cybercriminals are evolving, and organizations must stay ahead. Now is the time to bolster cybersecurity defenses, enhance observability, and strengthen response strategies. https://www.darkreading.com/cyberattacks-data-breaches/two-attacks-target-healthcare-sector-adds-growing-list-ransomware-threats https://www.darkreading.com/cyberattacks-data-breaches/ransomware-grip-healthcare https://redpiranha.net/red-piranha-2025-threat-intelligence-ransomware-report 🔍 How is your organization preparing for the next wave of ransomware threats? Let’s discuss in the comments. #CyberSecurity #Ransomware #HealthcareIT #ThreatIntel #RiskManagement

You Have 48 Hours! Key Insights from SonicWall’s 2025 Cyber Threat Report

 


Cybercriminals are moving fast! According to SonicWall’s 2025 Cyber Threat Report, attackers are now weaponizing new malware variants within 48 hours of discovery. Organizations with long patch cycles could be at serious risk. Top Cyber Threats: * Healthcare is the #1 target, with ransomware involved in 95% of breaches. * IoT attacks surged 124%, exploiting unpatched devices. * Business Email Compromise (BEC) is up 33%—watch out for phishing! * Malware-laced files: HTML, PDFs, and LOLBins (PowerShell abuse is rampant). * AI-driven threats: Server-Side Request Forgery (SSRF) attacks skyrocketed 450%! * Ransomware is rising: 8% in the U.S., 259% in Latin America. 🔹 What Can You Do? * Patch ASAP—48 hours isn’t much time! * Adopt Zero Trust for better security. * Use managed security services (MSSPs) to support SMBs. * Invest in observability & defense platforms to detect and respond to threats faster. https://www.sonicwall.com/threat-report https://www.infosecurity-magazine.com/news/hackers-use-exploit-code-within-48/ https://www.techrepublic.com/article/sonicwall-threat-report-2025/ Stay ahead of cyber threats with #PlixerOne! 📌 Subscribe for more cybersecurity updates!

Cyber Threats in 2025: Faster Ransomware, Smarter Phishing & How to Stay Safe

 


Cybercriminals are moving faster than ever, according to the 2025 Cyber Threat Report from Huntress, the average time to ransom has dropped from 17 hours to just 6. With automation, data is being exfiltrated before ransom demands even begin. Phishing tactics are evolving, using voicemails, QR codes, and e-signature scams to bypass security. Healthcare and education remain top targets, and info stealers are the go-to tool for cybercriminals. Learn how observability and defense platforms like Plixer One can help you detect, respond, and mitigate threats before it’s too late. Stay ahead of the game with Plixer.com! https://www.infosecurity-magazine.com/news/ransomware-gangs-prioritize-speed/ https://www.huntress.com/resources/2025-cyber-threat-report https://cybermagazine.com/articles/how-threat-actors-industrialised-cybercrime-in-2024 #PlixerOne

Tuesday, April 8, 2025

Simple, Fast, Powerful Network Data Replication

 


A Smarter Approach to Data Replication. In today’s complex IT environments, copying data between multiple sources and destinations for hundreds of devices can overwhelm staff and bandwidth. Your approach can affect the outcome of real-time, near-real-time, or out-of-sync data synchronization. Watch this webinar for an in-depth discussion on Plixer Replicator – a strong choice for organizations focused on high-speed, reliable UDP replication without the added overhead of event processing, storage requirements or sensors – just replicate data for use by SIEM, SOAR, XDR, storage, and more. In this session, you’ll learn how Plixer Replicator helps: ✔ Simplify Netflow Data Multicasting- Enables seamless multicasting distribution of network flow data between multiple sources and destinations without straining resources. ✔ Eliminates configuration complexity with a one-time setup that seamlessly forwards data and easily accommodates changes to the network ✔ Strengthens security and compliance by preventing cybercriminal obfuscation, ensuring critical network metadata is always available for audits and investigations. ✔ Increases business intelligence by efficiently forwarding UDP data for real-time analysis across multiple tools including SIEMs, flow collectors, big data platforms, and analytics applications. Learn more: https://www.plixer.com/products/replicator/

Tuesday, March 25, 2025

[Webinar] A Smarter Approach to Data Replication


 

Registration: https://plixer.zoom.us/webinar/register/WN_qAqczskJR-qLQzDCX07RzA#/registration It's a beautiful day to add Thursday, March 27th, 9AM PT. to your calendar for A Smarter Approach to Data Replication. Plixer Data Scientist Adam Howarth is eager to share the most effective ways for UDP multicasting for reporting, analyzing, and sharing NetFlow data and syslog information wherever needed and without the added overhead of event processing, storage requirements or sensors. Hey, your SIEMs, SOARs, XDRs and more need that data for real time analytics and analysis…and Plixer Replicator is the tool to do it. So join us Thursday, March 27th at 9 a.m. Pacific to learn how to get your network flow data from multiple destinations to multiple sources without putting a strain on your resources. Again, Thursday, March 27th grab a chair at 9AM PT. Hope to see you there.

Friday, March 21, 2025

Unlock Network Visibility with Plixer One: See More, Know More, Do More!

 


Discover the power of Plixer's Plixer One Observability and Defense Platform! Learn how it collects, analyzes, optimizes, and responds to network telemetry data, ensuring better visibility, faster threat detection, and efficient incident response. Watch this quick overview to understand how Plixer helps streamline your NOC and SOC operations.

If you want more network insights, visit www.plixer.com and don't forget to like, subscribe, and share!

Thursday, March 20, 2025

Streamline Network Data Collection Like a Pro

 


In under 2 minutes, discover just how easy it is to set up and configure Plixer Replicator for seamless network data forwarding. In this short walkthrough, we demonstrate the simple process of creating a new profile, defining rules, and adding destinations, making it easy to get started with Plixer Replicator and begin monitoring your network traffic in no time. See how to streamline network data forwarding to multiple destinations with minimal effort! Learn more: https://www.plixer.com/products/replicator/

Wednesday, March 5, 2025

Simplify Network Visibility with Plixer Replicator

 


Meet the Plixer Replicator, a powerful solution designed to streamline network traffic data collection and enhance security visibility. Plixer Replicator is a packet broker that acts as a UDP replicator, allowing you to forward network traffic from various devices to multiple collectors without having to reconfigure each device. This can help reduce bandwidth and storage usage, and provide full visibility and observability of your entire hybrid infrastructure. Back in 2012, as cloud adoption grew, Plixer anticipated the need for multiple collectors to handle virtual infrastructure. Instead of reconfiguring every device, the Plixer Replicator acts as a UDP replicator, efficiently forwarding NetFlow, IPFIX, syslog, and more to multiple collectors like SIEMs, security tools, and monitoring solutions. ✅ Why use Plixer Replicator? Eliminates reconfiguring network devices Enhances observability across hybrid infrastructure Reduces bandwidth & storage costs Improves incident response time (MTTR) Learn more at Plixer.com/products/replicator 👉 Like, Subscribe & Share with your network engineers! Aloha! 🌊 #Plixer #NetworkVisibility #NetFlow #SIEM #CyberSecurity #HybridInfrastructure #NetworkMonitoring #DataReplication #Observability

Tuesday, March 4, 2025

From Layoff to CEO: How Abigail Falcon-Rosa Reemployed Herself

 


Abigail Falcon Rosa turned job loss into opportunity, launching her own compliance consulting business instead of rejoining the corporate world. In this episode of the Top Tech Talent Reemployment Project, Peter dives into her inspiring journey—from navigating layoffs to building a successful advisory firm. Her compliance firm: www.alianzaadvisory.com Learn how she: ✔️ Identified market gaps in compliance and cybersecurity ✔️ Set up her own business from scratch ✔️ Supports small to mid-sized businesses with tailored solutions ✔️ Adapts to client needs, from language support to tech integration Abigail shares insights on overcoming job market challenges, leveraging community support, and embracing entrepreneurship. If you’re considering self-employment or consulting, this is a must-watch! 🔹 Connect with Abigail on LinkedIn: https://www.linkedin.com/in/abigail-falcon-rosa/ 🔹 Subscribe for more career transition stories! 0:00 Intro 1:00 How to Pronounce Abby's name 1:54 Abby's Backstory about her Job 2:50 Deciding to do her own GRC opportunity 3:25 Challenge of Applying for Compliance Jobs 5:25 Different Types of Compliance 5:46 Challenge for Organization's Regulations 6:37 Readiness Assessor 8:00 Adopting the Customer's Tech 9:39 Be Passionate about Your Work 10:58 Turn a Hobby into a Profession? 12:40 Abby's Advice - Community Support 14:00 Connect with Abby! 14:34 Wrap and Close! #Entrepreneurship #CareerTransition #ComplianceConsulting #Cybersecurity #Reemployment #JobSearch #SmallBusiness #SelfEmployment #TechCareers #LaidOff #CareerChange #BusinessGrowth #Consulting #WomenInTech #Leadership #Networking

Sunday, March 2, 2025

Efficient NetFlow & UDP Stream Management with Plixer Replicator

 


Managing network telemetry traffic can be a challenge, especially when exporters have limitations on destination outputs. Enter #Plixer #Replicator—a powerful solution designed to streamline NetFlow, IPFIX, syslog, and other UDP stream distribution efficiently. Discover how the Plixer Replicator simplifies network traffic management and optimizes data distribution. In this episode of the Plexus Demo Series, host Peter is joined by Adam Boeckmann, Asset Manager at Plexus, to discuss how Replicator streamlines NetFlow, IPFIX, syslog, and UDP stream forwarding. 🚀 Key Topics Covered: ✔ The origin and purpose of Plixer Replicator ✔ How it simplifies network telemetry distribution ✔ The easy-to-use interface for configuration ✔ Real-time monitoring, load balancing, and security benefits ✔ Reducing network overhead and enhancing security monitoring Learn how Plixer Replicator eliminates destination limitations and ensures that the right tools receive the right data. Whether you're a network engineer, SecOps professional, or IT manager, this tool can save time, optimize resources, and improve network visibility. Learn more: Plixer.com/Products/Replicator Simplify network traffic management Reduce overhead Enhance network visibility 👍 If you found this demo helpful, don’t forget to like, subscribe, and share with your colleagues! #PlixerReplicator #NetworkMonitoring #NetFlow #IPFIX #UDP #Syslog #NetworkSecurity #ITSolutions #NetworkVisibility

Monday, February 24, 2025

The Contractor Chronicles: Exciting Week Ahead!

 


Its Episode 16 of The Contractor, My Part-Time Life! If you're curious about the series name change, check out last week's episode. https://www.linkedin.com/feed/update/urn:li:activity:7297982009916760065/ Exciting updates this week: The Reemployment Project is back on schedule this week and special thanks to my old friend and former F5 & InfoBlox SE, Scott Friedman, for joining me last week! His video resume drops tomorrow so let’s show him some support! Sneak peek available: https://youtu.be/H-KInLDPOLQ 👀 This Thursday at 9 AM PT, Plixer is hosting a fresh webinar: Network Observability Redefined: Scrutinizer is Now Plixer One. I'm pretty sure one of the founders, Marc Bilodeau, will be a presenter! Don't miss this inside look at the future of observability & defense. https://plixer.zoom.us/webinar/register/WN_v0DbSvztTLKRLIuPHKnbpQ#/registration Got a busy week ahead and wishing you all a great Monday. Aloha!

Reemployment Project: Meet Scott Friedman - Technology Specialist & Systems Engineer

 


Scott Friedman joins Peter on the Top Tech Talent Reemployment Project to discuss his career journey, recent layoff experience, and what’s next for him in 2025. Scott, a seasoned pre-sales engineer and solutions architect, shares insights from his time at F5, Infoblox, and Cloud Software Group. He also talks about his passion for networking, mentorship, and community building through his role as an event director for North Texas ISSA. Beyond tech, Scott has been exploring new opportunities—including a potential career in recruiting—and even honing his skills as a poker player! If you’re looking for a highly skilled technical sales engineer, relationship builder, or industry expert, connect with Scott today. Are you a tech professional looking for your next opportunity? Drop a comment below to join the conversation and possibly be featured on a future episode! 📌 Connect with Scott – https://www.linkedin.com/in/scottjf8/ 📌 Subscribe for More – Stay updated with inspiring career stories and job-seeking tips! 🔔 Like & Subscribe to support those navigating career transitions!

Wednesday, February 19, 2025

From Unemployed to Part-Time! My New Role at Plixer

 


Week 15 of My Laid-Off Life is here, and it’s time for a title update—welcome to My Part-Time Contract Life! Exciting news: I’m now working with Plixer, managing their social media platforms, including YouTube, LinkedIn, Reddit, Twitter/X, and Facebook. We’re still rolling with The Reemployment Project, and this week is all about exploring part-time, contract, and consulting work—viable alternatives to the corporate grind. Plus, a funny twist of fate landed me at Plixer after an observability company passed on my application. The universe works in mysterious ways! Plixer YouTube: https://www.youtube.com/@UCwfyFJ2XqAtoWtt2t2765XQ Plixer LinkedIn: https://www.linkedin.com/company/plixer/ Plixer TwitterX: https://x.com/Plixer Plixer Facebook: https://www.facebook.com/plixer Plixer Reddit: https://www.reddit.com/r/Plixer/ Join me on this journey—subscribe for career insights, reemployment strategies, and industry updates!

Monday, February 10, 2025

Dave Bergmann's Childhood Dream – What Do Big Cats Have to Do with It?

 


Here, we asked Dave Bergmann a simple question. When you were a kid, what did you want to be when you grew up? Learn why Big Cats play a role in his answer and catch our full Reemployment Video Resume

Sunday, February 9, 2025

I Applied for My Old Job After Being Laid Off – Here’s What Happened

 


Would you apply for the same job you were laid off from just a few months earlier? Well, I did—and here’s how it went. This was part experiment, part genuine attempt to rejoin my former team as a Senior Product Marketing Manager. Despite my experience and familiarity with the role, things didn’t go as expected. In this episode of Top Tech Talent: The Reemployment Project, I share my journey of reapplying, the challenges I faced, and what I learned from the process. Have you ever considered going back to an old job? Let me know in the comments! 👉 Like, share, and subscribe for more real-world job search stories. #JobSearch #TechCareers #LayoffRecovery #ReemploymentProject

Thursday, February 6, 2025

TopTechTalent Reemployment Project: Our First 5 Job Seekers (Compilation)

 


After being let go from F5 in May 2023, I started thinking about how to support job seekers during tough times. That’s when I came up with the Top Tech Talent Reemployment Project—a video series featuring professionals who have been impacted by layoffs. The idea is simple: I host 5-7 minute interviews where we discuss your experience, skills, career goals, and even a fun hobby. These video resumes are designed to give job seekers a platform to shine. Whether you want to share them with recruiters, post on LinkedIn, or use them as personal introductions, I’ll record, produce, and send you the final file for free. This project isn’t just about creating content; it’s about building confidence, sharing stories, and connecting talent with opportunity. With the tech industry making headlines for layoffs, this could also become a go-to resource for recruiters looking for quality candidates. 0:00 Meet Alex Ryan - Threat Intelligence & Research 8:43 Meet Julia High - Content Strategist 24:25 Meet Linda Hagopian - B2B Marketing 39:23 Meet Mark Jacobs - Product Operations 52:12 Meet Dave Bergmann - Creative & Business Operations 🎥 Interested in being featured? Let’s collaborate and create something meaningful together. Drop me a message, and I’ll get back to you as soon as I can. 📺 Welcome to the Top Tech Talent Reemployment Project. Let’s turn challenges into opportunities and build something great together.

Thursday, January 30, 2025

Reemployment Project: Meet Dave Bergmann - Creative & Business Operations

 


In this episode of Top Tech Talent: The Reemployment Project, host Peter sits down with Dave Bergmann to discuss his career journey, job search, and the challenges of transitioning to a new role. With over 15 years of experience leading teams, managing cross-functional programs, and working in creative operations, Dave shares his insights on navigating the modern job market, staying resilient through career transitions, and the importance of networking. Dave also reflects on his leadership philosophy, his passion for fostering team growth, and how his diverse background in marketing, creative strategy, and business operations makes him a valuable asset to any organization. If you're hiring for project management, creative operations, or leadership roles, Dave would be the perfect fit for your team! 🔹 Connect with Dave Bergmann: https://www.linkedin.com/in/davebergmann222/ 🔹 Support job seekers by liking, sharing, and subscribing! Reemployment Playlist: https://www.youtube.com/watch?v=57f8g4xseY4&list=PL03E0zrrbwjtQUBOYnb4R-SnzAU3OfN3d&ab_channel=TopTechTalent #JobSearch #CareerTransition #TechCareers #Leadership #ProjectManagement #CreativeOperations #Networking #Hiring #Reemployment #JobMarket

Tuesday, January 28, 2025

Reemployment Project: Meet Mark Jacobs - Product Operations

 


In this episode of the Top Tech Talent Reemployment Project, Peter reconnects with his old colleague, Mark Jacobs, a seasoned cybersecurity professional with 30+ years of experience. Mark shares his journey, career aspirations, and insights into program management, product operations, and helping companies successfully transition from on-prem to SaaS models. Discover Mark’s unique approach to problem-solving, mentorship, and cross-functional collaboration as he discusses his proudest projects, surprising job search revelations, and the role music and creativity play in staying motivated during challenging times. If you’re looking for an experienced technologist or want to network with top talent, connect with Mark Jacobs today. Networking could be the key to your next big opportunity—it’s all about the connections! 📌 Connect with Mark: Check out his LinkedIn profile for opportunities to collaborate with this highly creative and versatile professional! https://www.linkedin.com/in/markjacobs6/ 📢 Interested in joining the show? If you’re open to work and want to showcase your skills, personality, and experience beyond a resume, drop a comment or DM us to get featured! 🎥 Don’t forget to like, share, and subscribe to support the project and stay updated on our latest episodes featuring top tech talent. #OpenToWork #CyberSecurity #ProgramManagement #TechCareers #JobSearchJourney #TopTechTalent

Friday, January 24, 2025

Unlock Your Dream Job: Mindset, Conversations, and LinkedIn Strategies

 


Aloha! Welcome to the Top Tech Talent Reemployment Project, where we help job seekers get back into the workforce with positivity, fun, and kindness. In this episode, I’m thrilled to chat with my former career coach, Javier Llerena, Chief Human Developer and career strategist. Together, we dive into: 🌟 The power of mindset in job hunting 🌟 Maximizing your LinkedIn profile as a personal branding tool 🌟 Creative approaches to bypass AI filters and land interviews 🌟 Strategies for having meaningful conversations with hiring managers and recruiters 🌟 The importance of company culture alignment 🌟 Seasonal hiring trends and how to navigate them Whether you're actively searching for a job or just looking to boost your career, this episode is packed with actionable advice. So, sit back, relax, and let's get started on your journey to finding your dream job! Share this video, give it a thumbs up, and let us know in the comments how you’re navigating your job search. 💼 Ready to share your story with us? Reach out! Let’s showcase your personality, charisma, and passion to the world. Thanks for watching, and Aloha! 🌴 #JobSearch #CareerTips #LinkedIn #Mindset #Networking #TopTechTalent #EmploymentHelp

r/*Reactions: Interview Nightmares - Time to Give Companies Real Feedback

 


Dive into the realities of today's hiring process with Top Tech Talent's Reemployment Project. In this Reddit Recording, we explore a fiery discussion from r/RecruitingHell, where a veteran recruiter calls for a "feedback revolution" to address the widespread unprofessionalism in recruiting. From ghosting to lowball offers, rude interviews, and lack of respect for candidates' time, these stories highlight the frustrations faced by job seekers. Why aren’t candidates calling out bad recruiters? Fear of retaliation, lack of time, and corporate cultures that ignore feedback are just a few reasons shared by Reddit users. Hear their eye-opening insights and join the conversation about how we can demand better treatment in the job market. Don't miss this candid look at the job search struggles many of us face. Like, comment, and subscribe for more Reddit reaction videos and job market insights from Top Tech Talent. Aloha! Read it here: https://www.reddit.com/r/recruitinghell/comments/1apifb6/interview_nightmares_time_to_give_companies_real/ #RecruitingHell #JobInterviews #HiringProcess #CareerStruggles #RedditReaction #JobMarket #InterviewTips #CandidateExperience #RecruitmentFail #ProfessionalGrowth

Thursday, January 23, 2025

Reemployment Project: Get Noticed with a Video Resume

 


In today’s ultra-competitive job market, a resumé and cover letter may not be enough to make you stand out. That’s where the Top Tech Talent Reemployment Project comes in! 🌟 Every Tuesday, we highlight a new candidate with a unique video resumé designed to showcase their personality, charisma, and professional potential. 🚀 These features have already given many of our participants a significant boost in their LinkedIn profiles—and they might just do the same for you. Reemployment Project: Meet Alex Ryan - Threat Intelligence & Research https://youtu.be/Z5a0OvDMmz8 Reemployment Project: Meet Julia High - Content Strategist https://youtu.be/k0jD1XISiLw Reemployment Project: Meet Linda Hagopian - B2B Marketing https://youtu.be/WNb3L0s7dK0 Join us in Episode 12 as we continue to support job seekers navigating their next big opportunity. Whether you're searching for work or want to support those who are, we’d love your help: ✔️ Drop a comment below. ✔️ Hit that like button. ✔️ Share this video to spread the word and empower others in their job search journey. 🙌 Let’s make an impact together—one video resumé at a time. Aloha! 🌺 #JobSearch #VideoResume #CareerTips #TopTechTalent #UnemployedLife #LinkedInBoost #ResumeTips

Behind the Hits Songwriters

 


In this compilation, we highlight: Trevor Horn, Rod Temperton, Bernie Taupin, Jim Valence, Cynthia Weil, Diane Warren, Mike Post, and Reeves Gabrels. 0:00 Trevor Horn 1:00 Rod Temperton 2:00 Bernie Taupin 3:00 Jim Valence 4:00 Cynthia Weil 5:00 Diane Warren 6:00 Mike Post 7: 00 Reeves Gabrels

Wednesday, January 22, 2025

Songs with Unique Words in the Title

 


Oh Boy So Many. Songs with Eclipse, Fool, Face, Little, Big, Last, Phone Numbers, California, Sad, Valentine, Super, Home, Word, River, Door, Smell, Midnight, Car, New, End, Storms, Law, Dream, Real, Moon, Black, Family, Doctor, One, Time, Band Name, Song, Turn, Three, Water, Fire, Jet, Love, Dark, Rain, Fly, Two, Cradle, Rock, Dog, Walk, Temperature, Doctor, Working, Cold, Wind, in the Title.

Tuesday, January 21, 2025

Reemployment Project: Meet Linda Hagopian

 


Welcome to the Top Tech Talent Reemployment Project! In this episode, Peter sits down with Linda Hagopian, an experienced marketing leader with a passion for collaboration, creativity, and results. Linda shares her journey in marketing, spanning everything from digital strategies to product launches, and highlights her expertise in content creation, branding, and team leadership. She discusses her challenges in navigating the current job market, the importance of human connection, and her approach to self-care during this transitional phase. With a successful track record that includes helping brands like Ericom launch groundbreaking products, Linda is a seasoned professional who thrives in team settings and is driven by her passion for marketing. Connect with Linda on LinkedIn: https://www.linkedin.com/in/lindahagopian/ Want to join the Top Tech Talent Reemployment Project? Drop a comment or message Peter to schedule your interview. 0:00 Intro 0:30 Meet Linda 1:00 About Linda 3:00 Roles Where Linda Excels 4:22 Satisfying & Successful Work Project 7:50 Learnings from the Job Market (Automation) 10:29 Self-Care During the Layoff 11:39 Connecting with People 12:40 If You Could Not Fail, What Would You Do? 14:00 Hire Linda! 14:30 That's a Wrap! #TopTechTalent #MarketingLeadership #JobSearch #CareerDevelopment #ReemploymentProject