Connect with us

Hi, what are you looking for?

AI Cybersecurity

N-able Enhances Cybersecurity with AI Detections for Hidden Attacks Across Networks

N-able enhances its Security Operations Centre with AI-driven detection of hidden attacks, addressing 50% of threats that bypass traditional monitoring tools.

N-able has enhanced its Security Operations Centre with new AI-driven detections through its partnership with Adlumin Managed Detection and Response. This update focuses on identifying suspicious activities that traditional monitoring tools may overlook, particularly as cybercriminals increasingly exploit familiar administrative tools to evade detection.

The latest features target anomalous PowerShell execution, suspicious DNS behaviour, and unusual Windows process execution, thereby providing analysts with greater visibility into endpoint, network, and identity activities. N-able’s 2026 State of the SOC Report indicates a shift in attack methods, noting that nearly half of observed attacks did not engage endpoints directly, unfolding instead across network, perimeter, cloud, or identity layers.

One notable new feature evaluates every PowerShell execution within monitored environments. This analysis aims to detect misuse disguised as legitimate activity, particularly associated with “living-off-the-land” techniques, where attackers utilize trusted tools already embedded in a system to avoid detection. A second addition employs machine learning algorithms to uncover suspicious DNS activities, which may signal command-and-control traffic, beaconing, or distributed denial-of-service behaviours that could elude endpoint monitoring.

The third element introduced is a model called Single-Event Process Execution, or SEPE. This model scrutinizes Windows process behaviours, assessing each event based on various attributes such as process name, path, parent process, and parent process path to provide analysts with more contextual behavioural data.

The announcement reflects a broader paradigm shift in cyber defence strategies, emphasizing the importance of monitoring behaviour across multiple layers rather than solely relying on endpoint signals. Security vendors and internal teams are increasingly focusing on detecting low-visibility techniques that blend seamlessly into normal system and network activities. This entails tracking legitimate tool usage, network patterns, and process chains that would not typically trigger traditional rule-based alerts, thereby enabling earlier identification of attacks, particularly when threat actors are attempting to remain concealed.

Troels Rasmussen, Vice President and General Manager of Security at N-able, noted that these new detections are tailored to address the evolving challenges in cybersecurity. “The fastest-growing attacks today don’t look malicious; they look like business as usual,” he stated. Rasmussen further explained, “Threat actors are blending into everyday activity using built-in tools like PowerShell. Our AI-driven approach correlates PowerShell, DNS disruption, and process behaviour to expose what legacy tools miss, helping teams detect and respond earlier, even when attackers are deliberately trying to disappear.”

The adjustments to N-able’s detection capabilities highlight the increasing reliance on AI models within managed detection and response services. By moving away from rigid signatures or predefined rules, these systems seek to identify behavioural patterns that deviate from the norm, enhancing their chances of detecting attacks, especially as adversaries modify their tactics to avoid traditional detection methods.

The commercial appeal for managed security providers lies in the potential to reduce the number of weak or irrelevant alerts while emphasizing incidents that require analyst scrutiny. This becomes crucial as security teams face mounting pressure to investigate more data across diverse systems without corresponding increases in personnel.

The new AI-driven additions are part of N-able’s broader initiative to integrate artificial intelligence into its security platform, automating aspects of the detection process. The company introduced these changes in response to the rapid evolution and complexity of modern attacks, which increasingly expose the limitations of traditional detection methodologies.

N-able currently serves over 500,000 organizations globally, and the new detection features are designed to assist customers in identifying malicious activities across various layers of their infrastructure, rather than relying solely on endpoint telemetry. As the landscape of cyber threats continues to evolve, such innovations underscore the necessity of adaptive and multifaceted security strategies.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

Top Stories

Hugging Face launches the Reachy Mini, an open-source AI robot for $299, enhancing desktop interactions with voice and vision capabilities through Raspberry Pi CM4...

Top Stories

Microsoft scales back AI Copilot features in Notepad and other apps following user backlash, signaling a shift toward simpler software integration.

AI Tools

Shopify CEO Tobi Lütke leverages Claude AI to create a web viewer for his MRI scans, highlighting AI's potential to streamline medical data access...

Top Stories

Perplexity launches the Comet AI browser for iPhone on March 11, enhancing user workflows and research efficiency across multiple devices.

Top Stories

FTC intensifies its investigation into Microsoft’s cloud and AI services, probing potential monopolistic practices that could reshape the tech landscape.

AI Cybersecurity

North Korean hackers exploit AI-generated video in a cross-platform malware campaign targeting cryptocurrency and fintech sectors, raising urgent cybersecurity concerns.

AI Tools

Skywork launches Skywork Desktop for Windows, a $49.99/month AI productivity tool leveraging local file intelligence to enhance workflows and reduce task completion times by...

AI Tools

Skywork unveils Skywork Desktop for Windows, a privacy-first AI agent that enhances productivity with local file intelligence, starting at $19.99 per month.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.