Security operations | 1 min readSecurity alert: zero-day vulnerability CVE-2023-4863 in libwebp (WebP) library
CVE-2023-4863 is a zero-day vulnerability in libwebp, which can result in arbitrary command execution when exploited. Here’s why it matters and what to do.
Engineering | 2 min readIntegrations roundup: maximize your existing tech investments
Our integrations portfolio includes 100+ technologies, and we’re always adding to that list. Here are the newest tech integrations we’ve added to our security operations platform, Expel Workbench™.
Security operations | 6 min readWake me up, before you log-log (…or when September ends, whichever comes first)
Logs are a necessary and useful component in any cybersecurity practice, but when and how you use them can significantly change your security outcomes.
Security operations | 3 min readRed team sneakiness: Splunking for AD certificate abuse
Recently we saw a red team operation which included attacks against Active Directory, and none of our detections picked them up. Here’s how we solved the mystery.
Engineering | 2 min readTwo new Expel Workbench™ improvements for greater transparency
We’ve released new features in Expel Workbench that improve transparency. These enhancements give you better visibility into your SecOps today, and what’s in store for the platform in the future.
Security operations | 3 min readNew partner program grows businesses, brands, relationships
Our approach serves the partner community by helping extract additional value from existing security investments and making them work harder. This way, partners can deliver additional value to their customers.
Security operations | 4 min readAiTM/business email compromise attacks: what to watch for
One of the most common ways attackers defeat MFA is by using an AiTM credential harvester. Here we outline the most common tactics and provide advice on how to short-circuit this dangerous attack.
Security operations | 2 min readCyberattackers evolve: the Quarterly Threat Report for Q2 2023
Our Q2 2023 Quarterly Threat Report examines the rise of commodity malware, AiTM phishing techniques, and the impact of new (and old) software vulnerabilities.
Talent | 3 min read20 tips for aspiring security operations center analysts
Candor, curiosity, passion for learning, humility, empathy, and being a good teammate can take a prospective security analyst far.