Security operations | 2 min read
Patch Tuesday roundup for October 2024

The October 2024 edition of Patch Tuesday is live, including 117 published CVEs from Microsoft. Our team reviewed the released patches so you don’t have to. Here are our top takeaways.

Security operations | 3 min read
Expel MDR has new advanced identity threat detection & response

Expel MDR launches new auto-remediation capabilities to reduce the manual work required to resolve credential compromises in commonly targeted tools, like Okta.

Security operations | 2 min read
Patch Tuesday roundup for September 2024

The September 2024 edition of Patch Tuesday is live, including 79 published CVEs from Microsoft. Our team reviewed the released patches so you don’t have to. Here are our top four takeaways.

Security operations | 7 min read
MDR insights: how our SOC identified & responded to CVE-2024-3400

Learn how Expel's security operations center (SOC) identified and resolved CVE-2024-3400 for one of our customers.

Security operations | 5 min read
MDR insights: using vulnerability data to inform remediation strategies

MDR vulnerabilities data can be used with EPSS scoring and the CISA catalog to glean insights, reduce alert noise, and guide remediation.

Security operations | 2 min read
Patch Tuesday roundup for August 2024

The August 2024 edition of Patch Tuesday is live, including 53 published CVEs from Microsoft. Our team reviewed the released patches so you don’t have to. Here are our top takeaways.

Security operations | 5 min read
Expel Quarterly Threat Report volume V: Latent-risk infostealing malware

Last up in our Q2 QTR series: we dig into infostealers and the importance of detecting, mitigating, and responding to this form of malware.

Security operations | 3 min read
Expel Quarterly Threat Report volume IV: Phishing trends

PhaaS platforms make phishing easy. In this volume in our series, we share what these are, how they work, and how they can be counteracted.

Security operations | 5 min read
Expel Quarterly Threat Report volume III: Malware infection trends

In this volume of our QTR blog series, we look at new trends in high-risk and latent-risk malware, and share how to protect your organization.

Security operations | 3 min read
Expel Quarterly Threat Report volume II: Attackers advance with AI

Next up in our QTR series: check out these examples of attackers using AI to advance their goals. Learn how they did it so you can be prepared in the future.

Security operations | 3 min read
Expel Quarterly Threat Report volume I: Q2 by the numbers

Our QTR series continues with the incident findings, trends, and takeaways from the second quarter of 2024. We kick-off with a summary of the key findings and stats from Q2.

Security operations | 2 min read
Security Alert: CrowdStrike Windows Outage

An issue in a CrowdStrike Falcon Sensor update rendered Microsoft’s Windows OS inoperable. Here’s what happened, why it matters, and what you can do about it now.

Security operations | 2 min read
Expel again recognized in the Gartner Market Guide for Managed Detection and Response Services

The report provides an overview of the MDR services market for buyers considering service providers. Here’s a peak at some of the insights you’ll find to help navigate this confusing space.

Security operations | 3 min read
AI and security: hype or hope?

AI is front-and-center on the security conference circuit. Now that the dust is settling and the AI picture is getting clearer, it's time to separate fact from fiction.

Security operations | 3 min read
How phishing threat actors are using AI: a real world example

Our phishing team recently intercepted an email that appears to contain AI-generated code. We break down what was sent and what it can teach us about adversarial use of AI for phishing.

Security operations | 2 min read
Patch Tuesday roundup for June 2024

The June 2024 edition of Patch Tuesday is live, including 53 published CVEs from Microsoft. Our team reviewed the released patches so you don’t have to. Here are our top takeaways.

Expel insider | 2 min read
Pack your bags: Expel hits the cybersecurity event circuit

We’re headed to the Gartner Security & Risk Management Summit and AWS re:Inforce to talk shop and show off our industry-leading services. Check out what we’re up to this security event season.

Security operations | 2 min read
Dropping knowledge and peace of mind: Expel at Infosecurity Europe 2024

Once again, we’re coming to London for Infosecurity Europe, and we’re talking about some of the most important issues facing CISOs and operators today.

Expel insider | 3 min read
Making Sense of the Seismic Shifts in the SIEM World

If you're wondering what's going on in the world of SIEM, you're not alone. We tackle some of the more pressing questions you probably have about this rapidly evolving area of security operations.

Security operations | 1 min read
Patch Tuesday roundup for May 2024

Patch Tuesday for May 2024 includes 67 published CVEs from Microsoft, and VMware joins the party with four CVEs of its own.

Security operations | 2 min read
RSA Conference 2024: Community unlocks possibility

This RSA Conference, we’re again reminded that when the cybersecurity community comes together, we can achieve great outcomes. We share what this means, along with other observations from RSAC.

Security operations | 2 min read
Expel expands MDR offerings for all levels of security maturity

We took the wraps off new, flexible MDR offerings to allow organizations of any size and budget to benefit from Expel’s award-winning MDR technology.

Security operations | 2 min read
Expel returns to RSA Conference and embraces “The Art of Possible”

Expel is once again exhibiting at RSA Conference, and we’re sharing the outcomes we enable that provide peace of mind and even help make PTO possible.

Security operations | 3 min read
The results are in: we’re officially a Leader in the IDC MarketScape for Worldwide Emerging MDR

Expel was named a Leader in the IDC MarketScape: Worldwide Emerging MDR Services 2024. Here are some areas where we believe really shine,including our 100% transparent approach and extensive coverage.

Security operations | 3 min read
Expel Quarterly Threat Report volume V: authentication bypass vulnerabilities

This year, our SOC has already seen 20 severe vulnerabilities identified and exploited. We shine a light on the most dangerous of those vulnerabilities and tell you how to protect your org.

Security operations | 3 min read
Expel Quarterly Threat Report volume IV: suspicious authentication sources

Our series wouldn’t be complete without an analysis of identity-related incidents. Take a look at some of the attacks our SOC team saw in Q1, emerging trends, and steps to protect your org.

Security operations | 2 min read
Expel Quarterly Threat Report volume III: high-risk malware

Next up in our Q1 QTR blog series, we examine high-risk malware incidents. This quarter, high-risk malware made up 67% of malware incidents. Here’s what our SOC team saw and how to protect your org.

Security operations | 2 min read
Expel Quarterly Threat Report volume II: attackers and AI

Our Q1 QTR blog series continues with a deeper look at attackers using AI to enable more sophisticated social engineering attacks. Check out our key findings and recommendations for protecting your org.

Threat intelligence | 3 min read
Expel Quarterly Threat Report volume I: Q1 by the numbers

Our new QTR series is full of incident findings, trends, and takeaway from the first quarter of 2024. To kick it off, here are the key takeaways on our findings, and an overview of Q1 by the numbers.

Tips | 7 min read
Top 10 MDR myths: debunked

The security landscape is increasingly complex, and the never-ending sea of solutions (and acronyms) isn’t helping. We break down the top MDR myths to help you make sense of the alphabet soup.

Security operations | 1 min read
Security alert: Palo Alto Networks PAN-OS GlobalProtect Command Injection Vulnerability

Palo Alto Networks disclosed that attackers are exploiting a vulnerability in PAN-OS for GlobalProtect. Here's what you need to know. 

Security operations | 2 min read
Patch Tuesday roundup for April 2024

The April 2024 Patch Tuesday included 150 CVEs from Microsoft and Adobe delivers multiple security updates to address 24 CVEs. Here’s what our team recommends to reduce exploit risk.

Expel insider | 1 min read
Expel clinches Gold at the 2024 Globee® Awards, named Top Cybersecurity Vendor of the Year

Our Top Cybersecurity Vendor of the Year honor from the Globee Awards underscores our commitment to securing digital infrastructures and safeguarding businesses against cyber threats.

Security operations | 2 min read
Expel x Google Cloud Next ‘24: pioneering next-gen cloud security

We’re heading out to Google Cloud Next ‘24 to elevate the discussion around cloud security with cloud visionaries and thought leaders. Will you be there?

Security operations | 1 min read
Security alert: XZ Linux utility backdoor

Researchers identified a backdoor into the XZ Linux utility, via supply chain compromise. Here’s what you need to know.

Security operations | 7 min read
Logs your SOC can use every day: a quick reference guide

We pulled the logs our SOC team use daily into a handy quick reference guide for our analysts—and now, you. Here’s your copy of a helpful log guide to make life easier for analysts.

Security operations | 3 min read
No honor among ransomware criminals

As the recent drama between the BlackCat ransomware gang and its affiliates shows, there’s no honor among thieves. Take steps to assess your org’s security now, so you can stay out of that kind of mess.

Security operations | 2 min read
Patch Tuesday roundup for March 2024

The March 2024 Patch Tuesday included 60 CVEs from Microsoft and a macOS Sonoma Security Update to address 68 CVEs from Apple. Here’s what our team recommends to reduce exploit risk.

Security operations | 2 min read
Security alert: Ivanti Connect Secure and Policy Secure zero-day vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) believes threat actors are exploiting Ivanti Connect Secure and Policy Secure zero-day vulnerabilities. Here's what to know.

Security operations | 2 min read
Security alert: ConnectWise ScreenConnect 23.9.8 security fix

Vulnerabilities affecting ConnectWise versions 23.9.7 and prior leave self-hosted and on-premise ScreenConnect instances exposed to attackers. Here’s what happened and what you can do about it now.

Security operations | 4 min read
Automated remediation: benefits and customization

Auto remediation represents substantial benefits, including cost savings and faster response times, but one size doesn’t fit all. Your solution should be customizable for your specific environment.

Security operations | 1 min read
GKE/Gmail vulnerability: notes and tips

Security researchers have discovered a new Google Kubernetes Engine misconfiguration. Here’s what you need to know.

Security operations | 7 min read
Transparency in MDR: three use cases

Transparency is one of our core tenets. It influences how we built our products, we interact with each other, how we design our compensation systems, and how we work with our customers and prospects.

Security operations | 3 min read
2024 Annual Threat Report: findings and predictions

This year’s Annual Threat Report describes the major attack trends we saw last year and offers advice to safeguard your org. Some of our top security minds also make predictions for 2024.

Security operations | 3 min read
New mind maps & cheat sheets: Azure & Kubernetes

Our new Kubernetes mind map/cheat sheet makes it easier for you to know which API calls are associated with different MITRE ATT&CK tactics in k8s environments.

Security operations | 6 min read
Assessing suspicious Outlook rules: an exercise

Outlook Inbox rules are used for legitimate and malicious reasons alike. Here are some actual case exercises, tips, and tricks on how to analyze them using the rule’s conditions alone.

Security operations | 5 min read
Working with your SOC/MDR during a security assessment

There are different kinds of security assessments, and what you perform should be aligned to your organization's goals.

Expel insider | 2 min read
Our top five cybersecurity predictions for 2024

Attempting to predict what the future holds for cybersecurity is tough. But we like a challenge. Here are our top five cybersecurity predictions for 2024.

Security operations | 4 min read
What frameworks and tools drive security maturity?

New research by the SANS Institute, commissioned by Expel, outlines the frameworks, tools, and techniques that drive security maturity. Spoiler alert: many orgs are lacking in some important areas.

Security operations | 3 min read
Hackers tattle to SEC: is this a good thing for cyberdefenders?

The ALPHV/BlackCat ransomware gang filed an SEC complaint against a victim for not disclosing an attack. They may have won the battle, but it’s possible the stunt will backfire in the long run.

Security operations | 2 min read
Beware this new-ish attacker tactic: QR code attacks

There’s been an increase in “qishing,” the use of QR codes to drive users to malicious URLs in credential harvesting attacks. Here’s what our SOC is seeing plus some insight on how to avoid them.

Security operations | 3 min read
What outcomes can you expect from security-enabled innovation?

Security ROI is about a lot more than dollars and cents. The research shows that security investments drive innovation, which has wide-reaching ripple effects that enable business success.

Security operations | 2 min read
Expel Workbench History = unparalleled MDR transparency

Managed security services can often feel like a black box. Workbench's History shows every investigative action in a single thread, from the moment it was triaged through its closure.

Security operations | 9 min read
Beware QR code phishing & other Grinchy scams this holiday season

As the holidays approach, cyber Grinches are targeting phishing campaigns to steal data, credentials and more. Look out for these email scams while online shopping and checking your inbox this season.

Security operations | 3 min read
When does an org need to up its cybersecurity game?

How do orgs know when or how to up their security game? Every company reaches an inflection point as it grows, and it must have an acceptable level of security to earn customer and partner trust.

Security operations | 2 min read
To build or to buy…that is the question

One of life’s great questions: should I build my own SOC or partner with an MDR provider? There’s a lot more that goes into the answer than dollars and cents alone.

Engineering | 3 min read
Suspicious Outlook rules: high-fidelity patterns to watch for

Inbox rule manipulation is hard to accurately alert on since inbox rule creation and management exist for valid reasons. Here’s some tips on how to spot high-fidelity inbox manipulation tactics.

Security operations | 3 min read
Cloud repatriation and cybersecurity challenges

Many factors influence the decision to move data and workflows back on-premises. Organizations conducting these migrations must plan for security both during and after the move.

Security operations | 3 min read
Okta cross-tenant impersonation: a new Expel detection

Okta recently described a novel attack on a customer organization. Expel analyzed the information and has developed two new detections for this attack.

Security operations | 3 min read
Following the lifecycle of a cloud alert in Expel Workbench

Our new tour shows you the journey a cloud alert takes in Expel MDR for Cloud Infrastructure. It might just change how you think about securing your cloud (or multi-cloud) environment.

Security operations | 3 min read
Expel Q3 Quarterly Threat Report: the top five findings

The Q3 Quarterly Threat Report findings are based on incidents our security operations center identified in the third quarter this year. Here are a few of the top trends.

Security operations | 2 min read
Oh Noes! Our IR tabletop game is new and improved!

Oh Noes!, our incident response RPG, draws games like D&D. You’ll create characters with unique abilities and skills, then role-play cybersecurity incidents specific to your organization.

Security operations | 2 min read
Bridging the risk and cybersecurity gap with Visa and Expel

Expel and Visa have entered into a strategic partnership to utilize MDR for both Visa as a customer and for their clients to mitigate cybersecurity risk.

Security operations | 3 min read
Hypothesis-based threat hunting: the what, why, and how

Your threat hunting program should focus on TTPs, holes, and areas of concern around your security posture and create hunts to probe those areas.

Security operations | 6 min read
Wake me up, before you log-log (…or when September ends, whichever comes first)

Logs are a necessary and useful component in any cybersecurity practice, but when and how you use them can significantly change your security outcomes.

Security operations | 3 min read
Red team sneakiness: Splunking for AD certificate abuse

Recently we saw a red team operation which included attacks against Active Directory, and none of our detections picked them up. Here’s how we solved the mystery.

Security operations | 4 min read
AiTM/business email compromise attacks: what to watch for

One of the most common ways attackers defeat MFA is by using an AiTM credential harvester. Here we outline the most common tactics and provide advice on how to short-circuit this dangerous attack.

Security operations | 2 min read
Cyberattackers evolve: the Quarterly Threat Report for Q2 2023

Our Q2 2023 Quarterly Threat Report examines the rise of commodity malware, AiTM phishing techniques, and the impact of new (and old) software vulnerabilities.

Security operations | 2 min read
How MDR complements your SIEM investment

MDR adapts to whatever your SIEM needs to do. Accelerate time-to-value and simplify how you view SIEM security alerts, so that you get the answers you need sooner and more time back for your team.

Engineering | 4 min read
The role of artificial intelligence in threat hunting

Artificial intelligence—or, more accurately, machine learning (ML)—is a huge boost for threat hunters thanks to its speed, proactivity, automation, efficiency, and ability to promote collaboration.

Security operations | 4 min read
Vulnerability prioritization improves security, saves time & money

The best way to reduce your risk profile is to prioritize vulnerabilities based on actual risk. Expel® Vulnerability Prioritization highlights your most critical vulnerabilities so you can fix them first.

Security operations | 2 min read
Addressing the new SEC cyber incident disclosure rules

New SEC rules require publicly traded companies to disclose cyberattacks within four days of determining they’re “material incidents.” We explain what this means and how we can help in that process.

Security operations | 3 min read
How phishing opens the door to business email compromise

Business email compromise shares similarities with typical phishing emails, but the two are distinct in some important ways. Understanding the differences is crucial.

Security operations | 2 min read
Threat hunting basics: understanding key principles

Threat hunting basics—continuous monitoring/visibility, intel-driven, hypothesis generation/testing, and collaboration/knowledge sharing—help you detect and smother threats in their infancy.

Security operations | 7 min read
Alert fatigue, burnout, turnover: lather, rinse, repeat

Many security orgs are trapped in a difficult cycle. The sheer volume of alerts causes alert fatigue, resulting in service quality degradation and fueling burnout, leading to employees leaving.

Security operations | 2 min read
Risk-based prioritization is the key to your vulnerability management challenges

Instead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.

Security operations | 2 min read
Threat hunting complements MDR for a stronger defensive strategy

An elite MDR operation works hand-in-hand with a threat hunting team that can jump into an investigation and rapidly uncover critical insights the MDR team can act on immediately.

Expel insider | 1 min read
Meet us at Infosec 2023

Infosecurity 2023 is around the corner and we’re thrilled to be making our debut on the showfloor. Connect with Expel at Stand G90!

Security operations | 1 min read
Security alert: critical Fortigate remote code execution vulnerability

Fortinet released a patch on June 9, 2023 for a critical vulnerability in Fortigate Firewalls. Here’s what happened, why it matters, and what you can do right now to reduce risk for you and your org.

Security operations | 3 min read
Security alert: MOVEit Transfer exploited vulnerability

Attackers are exploiting a vulnerability affecting all MOVEit Transfer versions to exfiltrate data and deploy ransomware.

Security operations | 2 min read
Top three findings from Q1 2023 Quarterly Threat Report

Hackers prefer the tried and true. As long as existing methods are working, they’re satisfied. Expel’s Q1 Quarterly Threat Report indicates too many of the existing methods are still working.

Security operations | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?

Vulnerability management encompasses the vulnerability handling lifecycle. Vulnerability prioritization assigns a level of importance to vulnerabilities based on their potential impact.

Security operations | 4 min read
Expel rides a Wave

Expel has been named a Leader in The Forrester Wave™: Managed Detection and Response, Q2 2023. Expel achieved the highest score in the Current Offering category at 4.6.

Security operations | 3 min read
Customer context: beware the homoglyph

Homoglyph phishing attacks seek to trick defenders by using URLs with characters that look like valid ones, but aren’t (ạ instead of a). Automation is far more effective in detecting these attacks.

Security operations | 2 min read
Add context to supercharge your security decisions in Expel Workbench

Defenders need so much information to make good security decisions in the SOC. Adding Context to Expel Workbench is one way to make faster and better decisions.

Expel insider | 3 min read
We’re definitely stronger together: top 3 takeaways from RSA Conference 2023

Another RSA Conference is in the books. Take a look at what jumped out to us most from the event, and how we as defenders are all “Stronger Together.”

Security operations | 3 min read
Companies with 250-1,000 employees suffer high security alert fatigue

IT decision-makers in the UK say alert fatigue is disrupting workers’ private lives, driving burnout and staff turnover. Companies with 250-1,000 employees are being hit especially hard.

Security operations | 3 min read
Introducing Expel Vulnerability Prioritization: our new solution for helping identify the highest-risk vulnerabilities

Expel Vulnerability Prioritization triages and investigates unresolved security issues to identify the vulnerabilities that are putting customers at the highest level of risk

Security operations | 3 min read
New UK cybersecurity report: top 5 findings

Expel’s new survey of UK IT decision makers reveals the primary concerns facing both security leaders and front-line workers.

Expel insider | 1 min read
#RSAC round 2: Expel heads back to Moscone

Expel is headed back to RSA Conference as an exhibitor for the second time. Stop by our booth to meet the crew, snag some swag, and let us show you security that makes sense.

Security operations | 4 min read
An easier way to navigate our security operations platform, Expel Workbench

Our security operations platform, Expel Workbench, got a makeover to make it easier for defenders to get what they need to protect their orgs even more quickly and intuitively.

Security operations | 2 min read
Security alert: 3CXDesktopApp supply chain attack

A supply chain attack on the voice and video conference software, 3CXDesktopApp, has the potential to turn 3CX installers into malicious tools for attacks. Here’s what happened and what you can do.

Security operations | 2 min read
Which flavor of MDR is right for your org?

Clear up your MDR confusion with the Gartner® Market Guide for Managed Detection and Response Services.

Security operations | 2 min read
How we spotted it: A Silicon Valley Bank phishing attempt

We’re starting to spot counterparty fraud attempts in the wake of SVB’s collapse. Learn how we spotted one attempt through a custom detection.

Security operations | 4 min read
The SOC organic

MDR should be organic, which means integrating the best available automation tech with the experience and insight of analysts who’ve been there, done that, and understand what customers need.

Security operations | 2 min read
Security PSA: SVB collapse presents ripe opportunity for counterparty fraud

Following the collapse of Silicon Valley Bank and the resulting uncertainty, the opportunity for cyber fraud is massive. Here’s why it matters and what you can do now to protect your org.

Expel insider | 2 min read
How we built it: the Expel SOC-in-the-Sky

Curious what it takes to convert a multi-purpose room on the top floor of a hotel into an around-the-clock SOC? Check out how (and why) we created a “SOC-in-the-Sky” for our recent company kickoff.

Security operations | 3 min read
Kubernetes security: what to look for

If your org does application development, Kubernetes is part of the future. What should you look for when building or shopping for a Kubernetes security platform? Here are a few suggestions.

Security operations | 3 min read
Why MDR for Kubernetes environments is great news for your org

This post discusses how managed detection and response (MDR) for Kubernetes environments helps organizations relying on in-house application development.

Security operations | 2 min read
2023 Great eXpeltations report: top six findings

Our second annual Great eXpeltations report details the major trends our security operations center (SOC) team saw in customer environments last year. It also offers insights and advice to help you avoid these threats.

Tips | 7 min read
So you’ve got a multi-cloud strategy; here’s how to navigate five common security challenges

Switching to a multi-cloud solution? Easy! Just kidding. Expel’s senior detection & response engineer shares some things you need to think about when going multi-cloud – and how to stay sane.

Tips | 2 min read
BEC and a “Visionary” scam

The lessons we learn in “real life” apply to the cyber world, and vice versa. You should take your sensitivity to the iffy product and service claims you encounter with you every day when you log in.

Security operations | 5 min read
Incident report: stolen AWS access keys

Here we walk through what happens when attackers steal a set of AWS access keys. Recently, our SOC, threat hunting, and detection engineering teams collaborated on such an incident.

Security operations | 3 min read
Emerging Threat: CircleCI Security Incident

Expel is aware of CircleCI’s reported security incident and recommendation to rotate all credentials. Here’s what happened, why it matters, what we’re doing, and what you should do.

Engineering | 1 min read
So long, 2022! Our year in review

To mark the end of 2022 and the beginning of 2023, we’ve curated some of our favorite blog posts from the past 12 months.

Expel insider | 3 min read
5 cybersecurity predictions for 2023

It’s that time of year when security folks gaze into the future and predict what’s on the horizon for 2023. Here’s what we think is up next for the cybersecurity industry in the new year.

Security operations | 3 min read
Expel Quarterly Threat Report Q3: Top 5 takeaways

Our third quarterly (Q3) threat report is here and it’s overflowing with cybersecurity data, trends, and recommendations to help you protect your organization. Here are our top five takeaways from Q3.

Security operations | 4 min read
Attacker-in-the-middle phishing: how attackers bypass MFA

A new credential phishing tactic–called “attacker-in-the-middle”–can be effective at end-running MFA defenses. This analysis describes AitM and provides helpful advice for defending against it.

Security operations | 2 min read
Security alert: high-severity vulnerability affecting OpenSSL V3 and higher

The OpenSSL Project has identified two security vulnerabilities affecting OpenSSL v3.0 and later. Potentially affected users of versions 3.0.0-3.0.6 should upgrade to v3.0.7 as soon as it is reasonable to do so.

Security operations | 4 min read
Who ya gonna call (to make the most of your SIEM data)?

Customers who import their SIEM to a tool like Workbench can translate all the hours invested in development into customized rules. In other cases, they may realize they no longer need a SIEM.

Tips | 5 min read
An Expel guide to Cybersecurity Awareness Month 2022

As proud Champions of Cybersecurity Awareness Month 2022, we’ve curated some Expel resources to help your organization improve its cybersecurity posture—this October, and beyond.

Security operations | 2 min read
Emerging Threats: Microsoft Exchange On-Prem Zero-Days

Until a patch is issued for the Microsoft Exchange Server zero-day vulnerabilities, there are a few things security teams can do to temporarily mitigate risk. Here’s what we recommend.

Security operations | 12 min read
Detection and response in action: an end-to-end coverage story

This dramatized case study illustrates how our MDR, phishing, and threat hunting services work, and most importantly, how they work together.

Security operations | 6 min read
Incident report: how a phishing campaign revealed BEC before exploitation

By the time the 89th phishing alert sounded, we knew a large-scale campaign had successfully hit a customer. This case walks you through what happened, what we did, and how it played out.

Security operations | 14 min read
MORE_EGGS and Some LinkedIn Resumé Spearphishing

This post details how we recently detected and disarmed a clever LinkedIn resume spearphishing attack.

Expel insider | 3 min read
That’s a wrap! Top 3 takeaways from Black Hat

Hacker Summer Camp (A.K.A Black Hat) felt especially energized this year, with more people, exhibitors, and fun. Read up on our takeaways from the show floor as first time exhibitors in Mandalay Bay.

Talent | 8 min read
A year in review: An honest look at a developer’s first 12 months at Expel

Get a peek behind the curtain as one of our senior software engineers reflects on his experience during his first year at Expel, from the interview process all the way to where he is now.

Security operations | 3 min read
Top 5 takeaways: Expel Quarterly Threat Report Q2

Our second quarterly (Q2) threat report is here and its chock full of cybersecurity data, trends, and recommendations to help you protect your organization. Here are our top five takeaways from Q2.

Security operations | 2 min read
A defender’s MITRE ATT&CK cheat sheet for Google Cloud Platform (GCP)

In this new handy guide, we mapped the patterns we’ve seen throughout our GCP incident investigations to the MITRE ATT&CK Framework to help give you a head start protecting your organization.

Security operations | 4 min read
How Expel’s Alert Similarity feature helps our customers

We process millions of alerts each day, and many look similar to one another. We asked ourselves: is it possible to teach our bots to compare similar “documents” and suggest or recommend a next step? (Spoiler alert: YES!)

Security operations | 2 min read
Emerging Threat: BEC Payroll Fraud Advisory

Our SOC recently observed BEC attacks across multiple customer environments, targeting access to human capital management systems—specifically, Workday. The goal? Payroll and direct deposit fraud.

Security operations | 2 min read
Cutting Through the Noise: RIOT Enrichment Drives SOC Clarity

Cutting Through the Noise: RIOT Enrichment Drives SOC Clarity

Security operations | 5 min read
Detecting Coin Miners with Palo Alto Networks NGFW

With cryptojacking on the rise, we walk through why we’ve found Palo Alto Networks next-generation firewall is great at detecting it, and some actions we’ve integrated into our detection bot to help.

Expel insider | 3 min read
Top 3 takeaways from RSA Conference 2022

It was four days of excitement as we made our exhibitor debut at #RSAC. Now that we’ve had time to reflect on this year’s conference, here are three of the big takeaways from our time at Moscone.

Expel insider | 3 min read
RSA Conference Day 3: Impressions From the Show Floor

Day three of the conference was full of interesting conversations with long-time industry folks who are no stranger to RSA. Here are some of our favorite takeaways and observations.

Security operations | 3 min read
Incident report: Spotting an attacker in GCP

In this report, we walk you through how an attacker gained access to a customer’s GCP environment, our investigative process, and some key takeaways for securing your organization.

Expel insider | 2 min read
RSA Conference Day 2: Inclusivity is the Goal

Another day at RSA full of interesting speakers, lessons learned, and (of course) cool swag — but one session stood out to us the most. Here are some of our main takeaways from day two.

Expel insider | 3 min read
RSA Conference Returns: Day 1 Keynote Summary

That’s a wrap on day one of #RSAC and we’re still reeling from excitement. From beatboxers to keynote speakers, here are some of our takeaways from the first day at Moscone.

Security operations | 4 min read
How Expel does remediation

Curious how Expel does remediation? Learn how our process works, what you can expect from our analysts during an investigation and what we’re adding next on our remediation roadmap.

Threat intelligence | 3 min read
Expel Quarterly Threat Report: Cybersecurity data, trends, and recs from Q1 2022

Top takeaways from our first quarterly report, filled with patterns and trends we identified from Q1 2022. Our goal? Help translate the events we detect into a security strategy for your organization.

Expel insider | 2 min read
Meet us at Moscone… Expel makes its #RSAC debut!

For the first time, Expel is headed to RSA Conference as an exhibitor! Stop by our booth to meet the crew, snag some swag, meet Josie and Ruxie, and let us show you that security can be delightful.

Expel insider | 2 min read
How to quantify security ROI… for real

Measuring cybersecurity ROI can feel like trying to nail Jello to a tree — frustrating and unproductive. Take some of the guesswork out of the equation with our new interactive ROI calculator.

Security operations | 6 min read
Incident report: From CLI to console, chasing an attacker in AWS

Our SOC detected and stopped unauthorized access in one of our customer’s AWS environments. Here’s how we spotted it, the steps we took to understand what they did, lessons learned and key takeaways.

Security operations | 5 min read
Attack trend alert: Email scams targeting donations to Ukraine

As more people look to donate to Ukrainian relief efforts, bad actors are taking advantage. Lookout for these phishing scams to ensure your donations are actually going to help those in need.

Security operations | 2 min read
Top 7 recs for responding to the Lapsus$ breach claims

While the situation surrounding the reported breach of Okta by Lapsus$ is still developing, here are our top 7 recommendations you can take to protect yourself and your org.

Security operations | 8 min read
Top Attack Vectors: February 2022

This report dives into the top attack vectors and trends among the incidents our SOC investigated in February 2022. Learn our key recommendations to protect your org from these types of attacks.

Security operations | 5 min read
Evaluating MDR providers? Ask these questions about their onboarding process

Looking for an MDR provider? Make sure you understand their onboarding process. Here are the questions you should ask when you’re evaluating MDRs. Bonus: learn how we do onboarding here at Expel.

Security operations | 6 min read
Top Attack Vectors: January 2022

This report dives into the top attack vectors and trends among the incidents our SOC investigated in January 2022. Learn our key recommendations to protect your org from these types of attacks.

Tips | 3 min read
5 pro tips for detecting in AWS

Cloud-based infrastructures can be confusing, but sometimes building a better security program starts with the basics. Try these pro tips to help focus the lens for detecting threats in AWS.

Security operations | 4 min read
Attack trend alert: AWS-themed credential phishing technique

They’re at it again. This time attackers are phishing for credentials by sending fake AWS log-in pages to unsuspecting users. Find out how our crew identified and triaged a phishing email.

Expel insider | 2 min read
Great eXpeltations 2022: Cybersecurity trends and predictions

Introducing Great eXpeltations 2022: Cybersecurity trends and predictions — an annual report from our security operations center (SOC) on top threats, how to handle them, and what to expect this year.

Security operations | 7 min read
Top Attack Vectors: December 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in December 2021. Learn our key recommendations to protect your org from these types of attacks.

Engineering | 5 min read
Threat hunting: Build or buy?

Not sure if you should build your own hunting capability or get a hunting partner? Check out this post to discover your options and the things you should consider (yes, we break down cost for you).

Security operations | 4 min read
What’s threat hunting and is it worth it?

Heard about hunting but are unclear on whether it’s something you should invest in? You’re not alone. Find out what it is and the value it brings to your org’s detection and response capabilities.

Security operations | 7 min read
Top Attack Vectors: November 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in November 2021. Learn our key recommendations to protect your org from these types of attacks.

Expel insider | 4 min read
More good news in still unusual times

We’ve reached a valuation over $1 billion thanks to our Series E fundraising round, led by CapitalG. Check out what our founders have to say about this exciting news and what’s next for Expel.

Security operations | 6 min read
Top Attack Vectors: October 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in October 2021. Learn our key recommendations to protect your org from these types of attacks.

Security operations | 5 min read
Top Attack Vectors: September 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in September 2021. Learn our key recommendations to protect your org from these types of attacks.

Security operations | 4 min read
How we use VMRay to support Expel for Phishing

How does Expel tackle phishing? Smart people and great tech. Learn how VMRay helps our analysts triage and analyze potentially malicious emails submitted by our managed phishing service customers.

Security operations | 5 min read
Top Attack Vectors: August 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in August 2021. Learn our key recommendations to protect your org from these types of attacks.

Security operations | 5 min read
The top phishing keywords in the last 10k+ malicious emails we investigated

Curious how attackers are prompting victims to engage with phishing campaigns? Check out the top keywords from the malicious emails our SOC investigated and our top resilience recommendations.

Security operations | 6 min read
Swimming past 2FA, part 2: How to investigate Okta compromise

First we showed you how to spot an Okta compromise in this two-part blog series. Now we’ll walk you through our investigation and share five tips on how you can strengthen your security defense.

Security operations | 5 min read
Top Attack Vectors: July 2021

This report dives into the top attack vectors and trends among the incidents our SOC investigated in July 2021. Learn our key recommendations to protect your org from these types of attacks.

Security operations | 6 min read
How Expel goes detection sprinting in Google Cloud

Building detections in Google Cloud Platform (GCP) but not sure where to start? Time to get strategic. Our detection and response engineers demystify the process for building detections in the cloud.

Security operations | 9 min read
Well that escalated quickly: How a red team went from domain user to kernel memory

A red team recently swooped in and showed off some new tactics. What started as a PowerShell download cradle quickly turned into a custom rootkit download. Find out how we spotted the crafty red team.

Security operations | 5 min read
Incident report: Spotting SocGholish WordPress injection

Our SOC stopped a ransomware attack that compromised WordPress CMS to trigger a drive-by RAT download. Find out what happened, how we caught it, and our recommendations to secure your WordPress CMS.

Security operations | 4 min read
How should my MDR provider support my compliance goals?

Need to ensure your tech, privacy and security policies are compliant? Find out what compliance means in practice and how your MDR provider can support your compliance program, not become a liability.

Security operations | 4 min read
Swimming past 2FA, part 1: How to spot an Okta MITM phishing attack

Crafty attackers are finding new ways to bypass multiple-factor authentication. Find out how our SOC detected an attack and get some tips on how your org can prevent credentials phishing.

Security operations | 3 min read
Kaseya supply chain attack: What you need to know

A new ransomware attack upheaved the beginning of Fourth of July weekend. Fortunately, there are steps you can take right now to stay safe. Find out what’s happening and how Expel is looking ahead.

Security operations | 4 min read
Someone in your industry got hit with ransomware. What now?

We’re noticing a trend in ransomware attacks. But that doesn’t mean it’s time to go into panic mode. Find out what you need to know and get some tips on how you can keep your org safe.

Security operations | 8 min read
How to measure SOC quality

You can scale your SOC and improve quality. Seems impossible? Not if you know how and what to measure. The crew that helped build Expel’s SOC explain how they pulled it off – and how you can too.

Security operations | 7 min read
Cloud attack trends: What you need to know and how to stay resilient

We shared the top attack trend spotted during the pandemic and what to keep an eye out for looking ahead. But how do you remediate and stay resilient against these attacks? Our crew shares some tips.

Security operations | 6 min read
Performance metrics, part 3: Success stories

Our team shares some success stories in creating efficiency and reducing analyst burnout. They end this three-part series with a gift from our SOC – a downloadable resource to measure performance.

Security operations | 3 min read
Expel Hunting: Now in the cloud

We’ve added something new to Expel Hunting: cloud hunts. Find out how our crew’s newly developed hunting techniques can help you spot visibility gaps in your cloud (and give you some peace of mind).

Security operations
The top cybersecurity attack trend we saw emerge during the COVID-19 pandemic

Check out our newest infographic to learn about the top attack trend during the COVID-19 pandemic, how our SOC’s data reinforces these recent findings and how you should be looking ahead.

Engineering | 11 min read
Migrating to GKE: Preemptible nodes and making space for the Chaos Monkeys

Find out how Expel’s internal teams collaborated to migrate our core infrastructure from a legacy environment to GCP, with no downtime (while also making sure they were prepared for a little chaos).

Expel insider | 1 min read
Wow, they really like us

Expel is recognized as a leader in The Forrester Wave™: Managed Detection And Response, Q1 2021 report. And our CEO – along with the whole Expletive crew – are pretty excited about it.

Engineering | 6 min read
5 best practices to get to production readiness with Hashicorp Vault in Kubernetes

Flying blind when it comes to running Hashicorp Vault in Kubernetes? We’ve got you covered. Accelerate your path to production without compromising on security with these tips and best practices.

Tips | 6 min read
How to create (and share) good cybersecurity metrics

Establishing metrics is vital. But how do you report progress and have a conversation about what you’re seeing? Are you even looking at the right things? Here are some tips on measuring cybersecurity.

Engineering | 8 min read
Containerizing key pipeline with zero downtime

Migrating to Kubernetes as Expel’s core engineering platform with zero downtime – and without interfering with our analysts’ workflow – is a tall order. But our engineers pulled it off. Find out how.

Security operations | 3 min read
Attack trend alert: REvil ransomware

Expel’s SOC spotted a new trend in REvil campaigns and they’re sounding the alarm. Find out what’s new about this type of attack, how our analysts spotted it and what you can do to protect your org.

Engineering | 12 min read
Behind the scenes: Building Azure integrations for ASC alerts

Find out how Expel’s internal teams built an integration on top of Azure signal – creating a new detection strategy for ASC that provides more context around alerts and improves customer visibility.

Expel insider | 2 min read
Introducing Expel Workbench™ for Amazon Web Services (AWS)

We’re excited to announce the launch of our first SaaS product! It automates the investigation of AWS alerts and logs – allowing your team to spend less time finding and fixing security issues.

Security operations | 1 min read
Got workloads in Microsoft Azure? Read this

Got Microsoft Azure? Running Microsoft products in your org? Then you might want to get a free copy of our all-new Azure guidebook.

Engineering | 7 min read
Plotting booby traps like in Home Alone: Our approach to detection writing

Find out how Expel’s D&R engineers think about detection writing, and how this process helps our SOC analysts make smart decisions and gain a deeper understanding of our customers’ environments.

Threat intelligence | 6 min read
Supply chain attack prevention: 3 things to do now

What do you do when you can’t trust the internet? Supply chain attacks like the SolarWinds Orion breach are not new. Here are some things you can do to help prepare and guard against similar attacks.

Security operations | 8 min read
Enhancing phishing protection: analyst & customer security

Discover how Expel's robust phishing protection measures safeguard our analysts and customers against email threats, providing utmost security and peace of mind.

Security operations | 3 min read
The SolarWinds Orion breach: 6 ideas on what to do next and why

Here are some of our early observations on the SolarWinds Orion breach, plus our ideas on what to do next to detect related activity and better protect your org.

Security operations | 8 min read
How to investigate like an Expel analyst: The Expel Workbench managed alert process

Ever wonder about how Expel’s analysts investigate alerts? Our SOC team created a workflow called the Expel Workbench managed alert process. Read on to find out how it works and how it can help you.

Security operations | 6 min read
Evilginx-ing into the cloud: How we detected a red team attack in AWS

Red team sneak attack? Bring it on. Find out how we tackled a red team attack using open source offensive security tools in AWS and what you can do to protect your org from similar attacks.

Security operations | 4 min read
The CISO in 2020 (and beyond): A chat with Bruce Potter

It’s impossible to sum up a year that felt like 1000 in a single blog post. But we did gather some topline takeaways on security trends and the evolving role of the CISO from Expel’s Bruce Potter.

Security operations | 2 min read
Introducing a mind map for AWS investigations

We’ve been doing a lot of investigations in AWS using CloudTrail logs and have been noticing some interesting things along the way. So we created an AWS mind map for our team (and you). Check it out!

Engineering | 2 min read
Announcing Open Source python client (pyexclient) for Expel Workbench

We’re open sourcing a python client in the Expel Workbench! This labor of love will allow our customers to take advantage of our APIs. Find out what the release of the pyexclient project includes.

Security operations | 9 min read
Performance metrics, part 2: Keeping things under control

In this second post in our three-part series on all things metrics and SOC leadership, our team dives into details of what metrics and techniques are used to protect the SOC against volatility.

Expel insider | 2 min read
Introducing Expel for phishing

Expel just introduced a new offering: Expel for Phishing! Lost in a sea of phishing emails? Find out how our product goes beyond automated triage and helps our customers come up for air.

Security operations | 8 min read
Why don’t you integrate with [foo]?

You’ve heard that Expel integrates with your tech. But not YOUR tech. What gives? Well, sometimes it doesn’t always make sense. Expel’s COO explains why and what this means when working with us.

Security operations | 10 min read
Performance metrics, part 1: Measuring SOC efficiency

How do you establish metrics for SOC efficiency? This first post in a three-part series shares our team’s approach to setting SOC goals, creating a strategy and measuring success.

Tips | 9 min read
3 steps to figuring out where a SIEM belongs in your security program

How can a SIEM help you address your business needs? Do you even need a SIEM? Here are some tips to help you make a decision that works best for you.

Security operations | 8 min read
Is Microsoft Defender for Endpoint good?

Expel has integrated Microsoft Microsoft Defender for Endpoint into our platform and we’re impressed! Our SOC analysts share why they love it and how they use it to triage alerts.

Security operations | 5 min read
The myth of co-managed SIEMs

Think you can get a co-managed SIEM and then step away to let the magic happen? Not so fast. Our CISO shares some common myths and the realities you should consider before making a decision.

Security operations | 8 min read
Behind the scenes in the Expel SOC: Alert-to-fix in AWS

Wonder what real-life investigation and response looks like in the cloud? Buckle up! Our team walks you through a coin-mining attack in AWS that they recently foiled – all the way from alert to fix.

Tips | 6 min read
Prioritizing suspicious PowerShell activity with machine learning

Attackers love to look to PowerShell to enact their evil plans. Expel’s senior data scientist tells us how she used machine learning to help analysts spot malicious activity in PowerShell quickly.

Tips | 6 min read
6 things to do before you bring in a red team

Red team engagements are essential to helping your SOC analysts stay battle ready. But before screaming, “CHARGE,” here are six things you should do to prepare for taking on a red team.

Expel insider | 1 min read
Introducing 24×7 monitoring and response for Google Cloud Platform

Running a Google Cloud Platform (GCP) workload or thinking about integrating it into your security portfolio? Expel can help! We’ve officially launched our GCP 24x7 monitoring and response services.

Tips | 6 min read
How to create and maintain Jupyter threat hunting notebooks

We got a lot of questions about configuring Jupyter notebooks after presenting at Infosec Jupyterthon 2020. See our response along with some tips for incorporating this tech into infosec processes.

Security operations | 8 min read
Spotting suspicious logins at scale: (Alert) pathways to success

Find out how our SOC analysts used automation to reduce the time it takes to investigate and report a suspicious login by 75%. The team outlines the process and shares a case study of it in action.

Security operations | 9 min read
Obfuscation, reflective injection and domain fronting; oh my!

During a recent red team engagement, the CrowdStrike EDR Platform alerted our SOC team on the execution of a suspicious VBScript file. This is what they learned from untangling the malware code.

Tips | 6 min read
Malware operators Zoom’ing in

Over the weekend, Expel’s analysts discovered a new way attackers are using Zoom to compromise users’ security. Here’s what they learned and what you can do to avoid getting duped.

Security operations | 5 min read
7 habits of highly effective (remote) SOCs

Security ops is a team sport … but how do you “play” together when your company’s working 100% remotely? Jon’s got some advice.

Talent | 6 min read
7 habits of highly effective SOCs

Wondering what it takes to build an effective SOC full of motivated, happy analysts? We’ve got some thoughts on that.

Tips | 10 min read
It’s time to drive a rising tide

There are a few cybersecurity fundamentals that keep us safe … but how do you get the people in your org to adopt them? Our COO Yanek Korff’s got some ideas.

Security operations | 8 min read
Our journey to JupyterHub and beyond

If you use or are considering trying JupyterHub, it’s your lucky day -- we’re sharing configuration tips and tricks, how we’re using it to make technical research easier, and much more.

Security operations | 5 min read
Managed detection and response (MDR): symptom or solution?

An uncommonly clear review of what managed detection and response (MDR) is, where it came from and what it can/can't do for you.