As cyberattacks become more evasive, N-able AI driven SOC capabilities are evolving to help organizations detect threats that blend into normal business activity.
N-able has announced new AI powered detection capabilities within its Security Operations Center, delivered through Adlumin Managed Detection and Response. The update introduces advanced detections for anomalous PowerShell activity, DNS disruption, and unusual process execution using its Single Event Process Execution AI model. These enhancements are designed to help organizations identify and stop increasingly stealthy attacks while improving overall business resilience.
The announcement reflects a growing challenge in cybersecurity. Modern attackers are increasingly using legitimate tools such as PowerShell and DNS to avoid detection, making malicious activity appear indistinguishable from routine operations. According to N-able’s 2026 State of the SOC Report, nearly half of observed attacks did not interact directly with endpoints, instead targeting network, cloud, identity, and perimeter layers.
“The fastest growing attacks today don’t look malicious, they look like business as usual,” said Troels Rasmussen, Vice President, General Manager of Security at N-able. “Threat actors are blending into everyday activity using built in tools like PowerShell. Our AI-driven approach correlates PowerShell, DNS Disruption, and process behavior to expose what legacy tools miss, helping teams detect and respond earlier, even when attackers are deliberately trying to disappear.”
The new capabilities are designed to provide deeper visibility across multiple layers of the enterprise environment. The anomalous PowerShell detection analyzes command execution in real time, identifying subtle signs of misuse often associated with living off the land techniques. DNS disruption detection uses machine learning to identify suspicious patterns such as command and control communication, beaconing, and distributed denial of service activity. Meanwhile, the SEPE AI framework evaluates process behavior across multiple attributes, offering security analysts richer context to understand potential threats.
These features are integrated into N-able’s broader AI driven SOC strategy, which focuses on correlating signals across identity, endpoint, and network layers. By combining these insights, the platform helps reduce blind spots that traditional security tools often fail to address.
The enhancements also aim to reduce the operational burden on security teams. By automating detection and providing contextual insights, the platform enables faster response times and more efficient incident investigation. This is particularly important as organizations face increasing pressure to manage complex threat environments with limited resources.
As cyber threats continue to evolve, the importance of layered visibility and intelligent detection is becoming more pronounced. N-able AI driven SOC capabilities highlight a shift toward proactive, behavior based security models that can adapt to sophisticated attack techniques.
By embedding AI across its security operations platform, N-able is helping organizations strengthen resilience and respond more effectively to threats that operate across multiple layers of modern IT environments.
Recommended Cyber Technology News:
- Cloudsmith Adds Threat Intelligence to Software Artifacts
- Cisco Expands AI Agent Security Strategy
- Spektrum Labs Unveils AI-Driven Cyber Resilience Platform
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




