Data & research
Data & research | 4 min read
MDR insights: Malware trends from the Q1 QTRDive into the malware data our SOC collected via incidents from Q1 2025. Here's what you should know, and how to defend against it.
Data & research | 5 min read
Expel Quarterly Threat Report, Q1 2025: Cloud infrastructure trendsVolume IV of our Q1 2025 Quarterly Threat Report summarizes key findings for cloud infrastructure. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report, Q1 2025: Endpoint threatsVolume III of our Q1 2025 Quarterly Threat Report summarizes key findings for endpoint threats. Learn what to focus on right now.
Data & research | 5 min read
Expel Quarterly Threat Report, Q1 2025: Cloud-based service trendsVolume II of our Q1 2025 Quarterly Threat Report summarizes key findings for cloud-based services. Learn what to focus on right now.
Data & research | 4 min read
Expel Quarterly Threat Report, Q1 2025: Q1 by the numbersVolume I of our Quarterly Threat Report summarizes key findings and stats from Q1 of 2025. Learn what to focus on right now.
Data & research | 8 min read
Key findings generation with GenAIAt Expel, we AI Responsibly. Our latest project focused on generating key findings (KF) to detail incident investigations.
Data & research | 5 min read
MDR insights: Tracking lateral movement in a Windows environment (part 2)This is part two of a pocket guide created by Expel's SOC analysts to track and identify lateral movement within your Windows environments.
Data & research | 2 min read
It’s here: Expel’s 2025 Annual Threat ReportThis year’s Annual Threat Report describes the major attack trends we saw last year, advice to safeguard your org, and predictions for 2025.
Data & research | 7 min read
MDR insights: Tracking lateral movement in a Windows environment (part I)This is a pocket guide created by Expel's SOC analysts to track and identify anomalous lateral movement within your Windows environments.
Data & research | 4 min read
A recap of our conversation on combatting security team burnoutThis on-demand webinar discusses burnout in cybersecurity, its downstream impact, and strategies you can use to combat it.
Data & research | 8 min read
MDR insights: defense against persistent threats and Oracle WebLogic CVE-2020-14882Initial access broker (IAB) Magnet Goblin is currently targeting CVE-2020-14882 in Oracle WebLogic. Here's how to identify and stop them.
Data & research | 5 min read
Expel Quarterly Threat Report Q3 2024, volume V: Preparing for software supply chain riskVolume V of our Q3 2024 Quarterly Threat Report focuses on preparing for software supply chain risk. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report Q3 2024, volume IV: Suspicious infrastructure from phishing-as-a-service (PhaaS) platformsVolume IV of our Q3 2024 Quarterly Threat Report focuses on phishing-as-a-service (PaaS). Learn what to focus on right now.
Data & research | 4 min read
Expel Quarterly Threat Report Q3 2024, volume III: Malware trendsVolume III of our Q3 2024 Quarterly Threat Report focuses on malware trends. Learn what to focus on right now.
Data & research | 4 min read
Expel Quarterly Threat Report Q3 2024, volume II: CAPTCHA trick or treatVolume II of our Q3 2024 Quarterly Threat Report focuses on malicious CAPTCHAs. Learn what to focus on right now.
Data & research | 2 min read
Expel Quarterly Threat Report, volume I: Q3 2024 by the numbersVolume I of our Quarterly Threat Report summarizes key findings and stats from Q3 of 2024. Learn what to focus on right now.
Data & research | 7 min read
MDR insights: how our SOC identified & responded to CVE-2024-3400Learn how Expel's security operations center (SOC) identified and resolved CVE-2024-3400 for one of our customers.
Data & research | 5 min read
MDR insights: using vulnerability data to inform remediation strategiesMDR vulnerabilities data can be used with EPSS scoring and the CISA catalog to glean insights, reduce alert noise, and guide remediation.
Data & research | 2 min read
From exhaustion to equilibrium: battling burnout in your SOCOur new ebook covers the burnout epidemic in the industry, and how you can address it.
Data & research | 5 min read
Expel Quarterly Threat Report Q2 2024 volume V: Latent-risk infostealing malwareLast up in our Q2 QTR series: we dig into infostealers and the importance of detecting, mitigating, and responding to this form of malware.
Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume IV: Phishing trendsPhaaS platforms make phishing easy. In this volume in our series, we share what these are, how they work, and how they can be counteracted.
Data & research | 5 min read
Expel Quarterly Threat Report Q2 2024 volume III: Malware infection trendsVolume III of our Quarterly Threat Report covers malware trends in Q2 of 2024. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume II: Attackers advance with AIVolume II of our Quarterly Threat Report covers how attackers are advancing with AI in Q2 of 2024. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume I: Q2 by the numbersVolume I of our Quarterly Threat Report summarizes key findings and stats from Q2 of 2024. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report volume V (Q1 2024): authentication bypass vulnerabilitiesIn volume V of our Q1 2024 QTR, we cover authentication bypass vulnerabilities. Here's what our SOC found and what you should know.
Data & research | 3 min read
Expel Quarterly Threat Report volume IV (Q1 2024): suspicious authentication sourcesIn volume IV of our Q1 2024 QTR, we're covering suspicious authentication sources. Take a look at what our SOC saw to learn from it.
Data & research | 2 min read
Expel Quarterly Threat Report volume III (Q1 2024): high-risk malwareNext up in our Q1 2024 QTR series, we examine high-risk malware incidents. Here's what our SOC learned, and how you can remediate.
Data & research | 2 min read
Expel Quarterly Threat Report volume II (Q1 2024): attackers and AINext up in our Q1 2024 QTR: check out these examples of attackers using AI to advance their goals. Learn what to focus on right now.
Data & research | 3 min read
Expel Quarterly Threat Report volume I (Q1 2024): Q1 by the numbersVolume I of our Quarterly Threat Report summarizes key findings and stats from Q1 of 2024. Learn what to focus on right now.