Threat intel | 3 min read
Are attackers retooling?

Vulnerability exploitation as an initial access vector is up year-over-year, and attackers are shifting strategies, so what gets prioritized?

Threat intel | 4 min read
Observing Atlas Lion (part two): Winning the battle, with an eye on the war

This is part two of our series on Atlas Lion, a threat group out of Morocco that targets organizations with fraudulent gift cards.

Threat intel | 4 min read
Observing Atlas Lion (part one): Why take control when you can enroll?

Cybercrime group Atlas Lion targets orgs using gift cards. Their attacks highlight the importance of secure enrollment processes for devices.

Threat intel | 5 min read
Patch Tuesday (Expel’s version): April 2025

The April 2025 edition of Patch Tuesday is live, and this month we included PHP vulnerability data Expel has seen recently.

SOC | 4 min read
Patch Tuesday (Expel’s version): March 2025

The March 2025 edition of Patch Tuesday is live, and this month we included ColdFusion vulnerability data Expel has seen recently.

Data & research | 2 min read
It’s here: Expel’s 2025 Annual Threat Report

This year’s Annual Threat Report describes the major attack trends we saw last year, advice to safeguard your org, and predictions for 2025.

Rapid response | 1 min read
Security alert: Palo Alto Networks firewall vulnerability

Palto Alto Networks (PAN) has a critical vulnerability that needs patched immediately to prevent network access via the firewall management interface.

Data & research | 8 min read
MDR insights: defense against persistent threats and Oracle WebLogic CVE-2020-14882

Initial access broker (IAB) Magnet Goblin is currently targeting CVE-2020-14882 in Oracle WebLogic. Here's how to identify and stop them.

Current events | 2 min read
A secure world is built together: closing out Cybersecurity Awareness Month

It's the end of Cybersecurity Awareness Month, but these resources are useful every month of the year to enhance resilience and stay secure.

MDR | 2 min read
Risk-based prioritization is the key to your vulnerability management challenges

Instead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.

MDR | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?

Prioritize vulnerabilities effectively. Learn how management covers the full lifecycle and why prioritization is key to reducing your risk.

Rapid response | 2 min read
Emerging Threats: Microsoft Exchange On-Prem Zero-Days

A new zero-day vulnerability affects Microsoft Exchange Server. Until a patch is issued, here are the steps you can take to mitigate risk.

Rapid response | 5 min read
Attack trend alert: Email scams targeting donations to Ukraine

Bad actors are using Ukrainian relief efforts for phishing scams. Learn how to spot them to ensure your donations help those in need.

Current events | 2 min read
Top 7 recs for responding to the Lapsus$ breach claims

Protect your org from the Okta breach by Lapsus$. Get our top 7 recommendations to secure yourself and your organization now.

Current events | 6 min read
Malware operators Zoom’ing in

New Zoom attack discovered over the weekend! See what Expel's analysts learned about the new compromise method to avoid getting duped.

Cloud security | 5 min read
MFA is not a silver bullet to secure your cloud email

Learn how dual or multi-factor authentication (MFA) are not an entirely secure solution for cloud email security on the Expel blog.

Current events | 4 min read
How public-private partnerships can support election security

Private sector to the rescue! CISO Bruce Potter offers ideas on how orgs can contribute to and strengthen election security measures.

MDR | 3 min read
Office 365 security best practices: five things to do right now to keep attackers out

Here are five Office 365 security best practices to check out right now.

MDR | 4 min read
Five quick checks to prevent attackers from weaponizing your website

Here are some of the most frequent ways attackers can use your website and your web presence to harm your company, your users and the public at large.