Threat intel | 3 min read
Are attackers retooling?

Vulnerability exploitation as an initial access vector is up year-over-year, and attackers are shifting strategies, so what gets prioritized?

Threat intel | 4 min read
Observing Atlas Lion (part two): Winning the battle, with an eye on the war

This is part two of our series on Atlas Lion, a threat group out of Morocco that targets organizations with fraudulent gift cards.

Threat intel | 4 min read
Observing Atlas Lion (part one): Why take control when you can enroll?

Cybercrime group Atlas Lion targets orgs using gift cards. Their attacks highlight the importance of secure enrollment processes for devices.

Threat intel | 5 min read
Patch Tuesday (Expel’s version): April 2025

The April 2025 edition of Patch Tuesday is live, and this month we included PHP vulnerability data Expel has seen recently.

SOC | 4 min read
Patch Tuesday (Expel’s version): March 2025

The March 2025 edition of Patch Tuesday is live, and this month we included ColdFusion vulnerability data Expel has seen recently.

Data & research | 2 min read
It’s here: Expel’s 2025 Annual Threat Report

This year’s Annual Threat Report describes the major attack trends we saw last year, advice to safeguard your org, and predictions for 2025.

Rapid response | 1 min read
Security alert: Palo Alto Networks firewall vulnerability

Palto Alto Networks (PAN) has a critical vulnerability that needs patched immediately to prevent network access via the firewall management interface.

Data & research | 8 min read
MDR insights: defense against persistent threats and Oracle WebLogic CVE-2020-14882

Initial access broker (IAB) Magnet Goblin is currently targeting CVE-2020-14882 in Oracle WebLogic. Here's how to identify and stop them.

Current events | 2 min read
A secure world is built together: closing out Cybersecurity Awareness Month

It's the end of Cybersecurity Awareness Month, but these resources are useful every month of the year to enhance resilience and stay secure.

MDR | 2 min read
Risk-based prioritization is the key to your vulnerability management challenges

Instead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.

MDR | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?

Prioritize vulnerabilities effectively. Learn how management covers the full lifecycle and why prioritization is key to reducing your risk.

Rapid response | 2 min read
Emerging Threats: Microsoft Exchange On-Prem Zero-Days

A new zero-day vulnerability affects Microsoft Exchange Server. Until a patch is issued, here are the steps you can take to mitigate risk.

Rapid response | 5 min read
Attack trend alert: Email scams targeting donations to Ukraine

Bad actors are using Ukrainian relief efforts for phishing scams. Learn how to spot them to ensure your donations help those in need.

Current events | 2 min read
Top 7 recs for responding to the Lapsus$ breach claims

Protect your org from the Okta breach by Lapsus$. Get our top 7 recommendations to secure yourself and your organization now.