Aaron Walton

Senior Threat Intelligence Analyst

Aaron Walton is a Senior Threat Intel Analyst at Expel, responsible for monitoring, tracking, and analyzing trends to help customers disrupt their adversaries. He’s an accomplished malware and threat researcher, frequently contributing to cybersecurity publications and conferences.

Posts by Aaron Walton

Rapid response | 1 min read
Notepad++ supply chain incident

The developer of Notepad++ disclosed an incident where actors identified a means to tamper with the delivery of automatic updates.

Rapid response | 1 min read
Security alert: Critical unauthenticated RCE vulnerabilities in Ivanti EPMM

Two zero-day command injection vulnerabilities affecting Ivanti EPMM are currently being actively exploited: CVE-2026-1281 and CVE-2026-1340.

Threat intel | 12 min read
Planned failure: Gootloader’s malformed ZIP actually works perfectly

Gootloader malware contains a deliberately malformed ZIP archive to bypass detection, but can also be identified by its unique formatting.

Rapid response | 2 min read
Active exploitation notice: React2Shell critical vulnerability (CVE-2025-55182)

A React2Shell critical vulnerability (CVE-2025-55182) is under active exploitation. Here's what you need to know and how to identify it.

Threat intel | 3 min read
Expel Quarterly Threat Report, Q3 2025: Threat intel recap

Here's a refresher on the threat intel we shared throughout the third quarter of 2025. Catch up on what you missed.

Threat intel | 4 min read
Expel Quarterly Threat Report, Q3 2025: Q3 by the numbers

Part I of our Quarterly Threat Report summarizes key findings and stats from Q3 of 2025. Learn what to focus on right now.

Threat intel | 6 min read
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates

Rhysida ransomware gang has been using code-signing certificates to validate their malware campaigns repeatedly. Here's the latest.

Rapid response | 2 min read
Security alert: WSUS remote code execution vulnerability

A critical WSUS vulnerability (CVE-2025-59287) is under active exploitation. Learn what happened, why to care, and how to protect your org.

Threat intel | 17 min read
The history of AppSuite: the certs of the BaoLoader developer

We're tracking the malware BaoLoader and their fraudulent code-signing certificates via AppSuite-PDF and PDF editor campaigns.

Threat intel | 10 min read
You don’t find ManualFinder, ManualFinder finds you

We're investigating ManualFinder, a trojan malware we're seeing in new activity, likely coming from potentially unwanted programs (PUPs).

Threat intel | 4 min read
Patch Tuesday: August 2025 (Expel’s version)

The August 2025 edition of Patch Tuesday is live, and this month we're highlighting targeted SharePoint vulnerabilities.

Threat intel | 5 min read
Expel Quarterly Threat Report, Q2 2025: Threat intel recap

Here's a refresher on the threat intel we shared throughout the second quarter of 2025. Catch up on what you missed.

Rapid response | 2 min read
Update on the SharePoint ToolShell vulnerability exploitation (CVE-2025-53770)

Over the weekend, a zero-day vulnerability for SharePoint 16.0.0.0 and earlier versions was targeted. Here's what you need to know.

Threat intel | 5 min read
Expel Quarterly Threat Report, Q2 2025: Q2 by the numbers

Part I of our Quarterly Threat Report summarizes key findings and stats from Q2 of 2025. Learn what to focus on right now.

Threat intel | 3 min read
Patch Tuesday: July 2025 (Expel’s version)

The July 2025 edition of Patch Tuesday is live, and this month we're highlighting a couple of vulnerabilities in Citrix NetScaler.

Rapid response | 2 min read
Security alert: Citrix NetScaler ADC and NetScaler Gateway vulnerabilities allow unauthorized access

Citrix released two vulnerabilities (CVE-2025-5777 and CVE-2025-6543) that impact NetScaler ADC and NetScaler Gateway. Here's what to know and what to do.

Rapid response | 2 min read
Scattered Spider’s heightened activity—here’s the 411

Threat group Scattered Spider is making headlines again as they increase targeting for financial services and insurance orgs.

Threat intel | 6 min read
Following the spiders: Investigating Latrodectus malware

Latrodectus malware is the latest infostealing malware on the market utilizing the ClickFix technique. Here's what you need to know.

Threat intel | 4 min read
MDR insights: Malware trends from the Q1 QTR

Dive into the malware data our SOC collected via incidents from Q1 2025. Here's what you should know, and how to defend against it.

Rapid response | 4 min read
Phishing in Teams: the new ransomware frontline

Expel's SOC has seen a spike in Microsoft Teams phishing messages. Here's what you need to know and how to stop it.

Threat intel | 5 min read
Expel Quarterly Threat Report, Q1 2025: Cloud infrastructure trends

Volume IV of our Q1 2025 Quarterly Threat Report summarizes key findings for cloud infrastructure. Learn what to focus on right now.

Threat intel | 3 min read
Expel Quarterly Threat Report, Q1 2025: Endpoint threats

Volume III of our Q1 2025 Quarterly Threat Report summarizes key findings for endpoint threats. Learn what to focus on right now.

Threat intel | 5 min read
Expel Quarterly Threat Report, Q1 2025: Cloud-based service trends

Volume II of our Q1 2025 Quarterly Threat Report summarizes key findings for cloud-based services. Learn what to focus on right now.

Threat intel | 4 min read
Expel Quarterly Threat Report, Q1 2025: Q1 by the numbers

Volume I of our Quarterly Threat Report summarizes key findings and stats from Q1 of 2025. Learn what to focus on right now.

Threat intel | 5 min read
Patch Tuesday (Expel’s version): April 2025

The April 2025 edition of Patch Tuesday is live, and this month we included PHP vulnerability data Expel has seen recently.

Threat intel | 12 min read
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)

Ransomware gang Black Basta's chats were recently leaked, proving how they abuse code-signing certificates. Here's how to defend against it.

Data & research | 2 min read
It’s here: Expel’s 2025 Annual Threat Report

This year’s Annual Threat Report describes the major attack trends we saw last year, advice to safeguard your org, and predictions for 2025.

Rapid response | 1 min read
Security alert: Ivanti zero-day vulnerability

Ivanti disclosed a critical zero-day vulnerability impacting multiple products. Address it immediately to prevent unauthenticated remote code execution.

Rapid response | 1 min read
Security alert: Palo Alto Networks firewall vulnerability

Palto Alto Networks (PAN) has a critical vulnerability that needs patched immediately to prevent network access via the firewall management interface.

Data & research | 8 min read
MDR insights: defense against persistent threats and Oracle WebLogic CVE-2020-14882

Initial access broker (IAB) Magnet Goblin is currently targeting CVE-2020-14882 in Oracle WebLogic. Here's how to identify and stop them.

Data & research | 5 min read
Expel Quarterly Threat Report Q3 2024, volume V: Preparing for software supply chain risk

Volume V of our Q3 2024 Quarterly Threat Report focuses on preparing for software supply chain risk. Learn what to focus on right now.

Data & research | 3 min read
Expel Quarterly Threat Report Q3 2024, volume IV: Suspicious infrastructure from phishing-as-a-service (PhaaS) platforms

Volume IV of our Q3 2024 Quarterly Threat Report focuses on phishing-as-a-service (PaaS). Learn what to focus on right now.

Data & research | 4 min read
Expel Quarterly Threat Report Q3 2024, volume III: Malware trends

Volume III of our Q3 2024 Quarterly Threat Report focuses on malware trends. Learn what to focus on right now.

Data & research | 4 min read
Expel Quarterly Threat Report Q3 2024, volume II: CAPTCHA trick or treat

Volume II of our Q3 2024 Quarterly Threat Report focuses on malicious CAPTCHAs. Learn what to focus on right now.

Data & research | 2 min read
Expel Quarterly Threat Report, volume I: Q3 2024 by the numbers

Volume I of our Quarterly Threat Report summarizes key findings and stats from Q3 of 2024. Learn what to focus on right now.

Data & research | 7 min read
MDR insights: how our SOC identified & responded to CVE-2024-3400

Learn how Expel's security operations center (SOC) identified and resolved CVE-2024-3400 for one of our customers.

Data & research | 5 min read
Expel Quarterly Threat Report Q2 2024 volume V: Latent-risk infostealing malware

Last up in our Q2 QTR series: we dig into infostealers and the importance of detecting, mitigating, and responding to this form of malware.

Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume IV: Phishing trends

PhaaS platforms make phishing easy. In this volume in our series, we share what these are, how they work, and how they can be counteracted.

Data & research | 5 min read
Expel Quarterly Threat Report Q2 2024 volume III: Malware infection trends

Volume III of our Quarterly Threat Report covers malware trends in Q2 of 2024. Learn what to focus on right now.

Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume II: Attackers advance with AI

Volume II of our Quarterly Threat Report covers how attackers are advancing with AI in Q2 of 2024. Learn what to focus on right now.

Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume I: Q2 by the numbers

Volume I of our Quarterly Threat Report summarizes key findings and stats from Q2 of 2024. Learn what to focus on right now.

MDR | 3 min read
How phishing threat actors are using AI: a real world example

Our phishing team intercepted an email that appears to contain AI-generated code. Here's what it can teach you.

Data & research | 3 min read
Expel Quarterly Threat Report volume V (Q1 2024): authentication bypass vulnerabilities

In volume V of our Q1 2024 QTR, we cover authentication bypass vulnerabilities. Here's what our SOC found and what you should know.

Data & research | 3 min read
Expel Quarterly Threat Report volume IV (Q1 2024): suspicious authentication sources

In volume IV of our Q1 2024 QTR, we're covering suspicious authentication sources. Take a look at what our SOC saw to learn from it.

Data & research | 2 min read
Expel Quarterly Threat Report volume III (Q1 2024): high-risk malware

Next up in our Q1 2024 QTR series, we examine high-risk malware incidents. Here's what our SOC learned, and how you can remediate.

Data & research | 2 min read
Expel Quarterly Threat Report volume II (Q1 2024): attackers and AI

Next up in our Q1 2024 QTR: check out these examples of attackers using AI to advance their goals. Learn what to focus on right now.

Data & research | 3 min read
Expel Quarterly Threat Report volume I (Q1 2024): Q1 by the numbers

Volume I of our Quarterly Threat Report summarizes key findings and stats from Q1 of 2024. Learn what to focus on right now.

Rapid response | 1 min read
Security alert: Palo Alto Networks PAN-OS GlobalProtect Command Injection Vulnerability

Palo Alto Networks disclosed that attackers are exploiting a vulnerability in PAN-OS for GlobalProtect. Here's what you need to know. 

Current events | 2 min read
Patch Tuesday roundup for April 2024

The April 2024 Patch Tuesday included 150 CVEs from Microsoft and 24 CVEs from Adobe. Here’s what our team recommends to reduce exploit risk.

Rapid response | 1 min read
Security alert: XZ Linux utility backdoor

Researchers identified a backdoor into the XZ Linux utility, via supply chain compromise. Here’s what you need to know.

MDR | 3 min read
No honor among ransomware criminals

Take steps to assess your org’s security now, so you can protect yourself from ransomware gangs like BlackCat.

Current events | 2 min read
Patch Tuesday roundup for March 2024

The March 2024 Patch Tuesday included 60 CVEs from Microsoft and 68 CVEs from Apple. Here’s what our team recommends to reduce exploit risk.

Rapid response | 2 min read
Security alert: Ivanti Connect Secure and Policy Secure zero-day vulnerabilities

Ivanti Connect Secure and Policy Secure zero-day vulnerabilities are being exploited. Here's how to protect against them.

Rapid response | 2 min read
Security alert: ConnectWise ScreenConnect 23.9.8 security fix

Vulnerabilities in ConnectWise versions 23.9.7 and prior leave some ScreenConnect instances exposed to attackers. Here’s how to fix it.

Data & research | 3 min read
2024 Annual Threat Report: findings and predictions

This year’s Annual Threat Report shares the major attack trends from last year, advice to secure your org, and predictions for 2024.

Current events | 2 min read
Our top five cybersecurity predictions for 2024

Here are our top five cybersecurity predictions for 2024 from Expel experts and leadership based on trends and current events.

Rapid response | 2 min read
Security alert: Okta “support user” data theft

Okta recently determined an attacker stole user support system info in October 2023. Here’s what Okta customers need to do right now.

Data & research | 3 min read
Expel 2023 Q3 Quarterly Threat Report: the top five findings

The 2023 Q3 Quarterly Threat Report findings are based on incidents our SOC identified. Here are a few of the top trends.

Rapid response | 1 min read
Security alert: privilege escalation vulnerability in Confluence Data Center and Server, CVE-2023-22515

Here's how to mitigate a Confluence Data Center and Server vulnerability that lets attackers create admin accounts on external-facing servers.

Data & research | 2 min read
Cyberattackers evolve: the Quarterly Threat Report for Q2 2023

Our Q2 2023 Quarterly Threat Report examines the rise of commodity malware, AiTM phishing techniques, and the impact of software vulnerabilities.

Rapid response | 1 min read
Security alert: critical Fortigate remote code execution vulnerability

Get a clear breakdown of the critical Fortigate Firewall vulnerability's impact and steps you can take to reduce your risk.

Security operations | 3 min read
Security alert: MOVEit Transfer exploited vulnerability

Attackers are exploiting a vulnerability affecting all MOVEit Transfer versions to exfiltrate data and deploy ransomware.

Rapid response | 2 min read
Security alert: high-severity vulnerability affecting OpenSSL V3 and higher

Two new security flaws affect OpenSSL v3.0 and later. Learn about the vulnerabilities and why you should upgrade to v3.0.7 as soon as it's reasonable.