Vulnerability management
Threat intel | 3 min read
Are attackers retooling?Vulnerability exploitation as an initial access vector is up year-over-year, and attackers are shifting strategies, so what gets prioritized?
Threat intel | 4 min read
Observing Atlas Lion (part two): Winning the battle, with an eye on the warThis is part two of our series on Atlas Lion, a threat group out of Morocco that targets organizations with fraudulent gift cards.
Threat intel | 4 min read
Observing Atlas Lion (part one): Why take control when you can enroll?Cybercrime group Atlas Lion targets orgs using gift cards. Their attacks highlight the importance of secure enrollment processes for devices.
Threat intel | 5 min read
Patch Tuesday (Expel’s version): April 2025The April 2025 edition of Patch Tuesday is live, and this month we included PHP vulnerability data Expel has seen recently.
SOC | 4 min read
Patch Tuesday (Expel’s version): March 2025The March 2025 edition of Patch Tuesday is live, and this month we included ColdFusion vulnerability data Expel has seen recently.
Data & research | 2 min read
It’s here: Expel’s 2025 Annual Threat ReportThis year’s Annual Threat Report describes the major attack trends we saw last year, advice to safeguard your org, and predictions for 2025.
Rapid response | 1 min read
Security alert: Palo Alto Networks firewall vulnerabilityPalto Alto Networks (PAN) has a critical vulnerability that needs patched immediately to prevent network access via the firewall management interface.
Data & research | 8 min read
MDR insights: defense against persistent threats and Oracle WebLogic CVE-2020-14882Initial access broker (IAB) Magnet Goblin is currently targeting CVE-2020-14882 in Oracle WebLogic. Here's how to identify and stop them.
Current events | 2 min read
A secure world is built together: closing out Cybersecurity Awareness MonthIt's the end of Cybersecurity Awareness Month, but these resources are useful every month of the year to enhance resilience and stay secure.
MDR | 2 min read
Risk-based prioritization is the key to your vulnerability management challengesInstead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.
MDR | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?Prioritize vulnerabilities effectively. Learn how management covers the full lifecycle and why prioritization is key to reducing your risk.
Rapid response | 2 min read
Emerging Threats: Microsoft Exchange On-Prem Zero-DaysA new zero-day vulnerability affects Microsoft Exchange Server. Until a patch is issued, here are the steps you can take to mitigate risk.
Rapid response | 5 min read
Attack trend alert: Email scams targeting donations to UkraineBad actors are using Ukrainian relief efforts for phishing scams. Learn how to spot them to ensure your donations help those in need.
Current events | 2 min read
Top 7 recs for responding to the Lapsus$ breach claimsProtect your org from the Okta breach by Lapsus$. Get our top 7 recommendations to secure yourself and your organization now.
