Threat intelligence
2024 Cybersecurity Enhanced Resilience Checklist
Our report surfaces the most significant data we’re seeing in our threat detection and response efforts and offers resilience recommendations to protect your organization.
Inside an investigation: compromised AWS access keys
Hear how we caught an attacker that used a developer’s machine to gain access to AWS.
Stories from the SOC: Investigating a phishing attack
Expel’s Ray Pugh walks through a phishing investigation. Learn how our analyst determines if it was malicious, who has been compromised and how to get left of the threat.