ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right
lock Icon

Anatomy of an Attack

post image

Anatomy of an Attack: European Cyber Threat Landscape: December 2025

January 14, 2026

Explore how specialized cyber operations in December 2025 weaponized BitLocker and used traffic mimicry to target critical infrastructure in Romania, France, and the UK. Learn how ExtraHop RevealX detects these "Living off the Land" tactics and supply chain breaches.

cover image for SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage
SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage

January 8, 2026

Stop the SHADOW-VOID-042 espionage campaign. See how this Void Rabisu-linked threat uses deceptive lures and zero-days. Learn how ExtraHop decodes 90+ protocols @ 100 Gbps to catch it.

cover image for CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits
CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits

December 9, 2025

React2Shell (CVE-2025-55182) is a CVSS 10.0 RCE flaw in Next.js and React Server Components. See how ExtraHop NDR decrypts the payload and detects post-exploit credential theft.

cover image for Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK
Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK

December 8, 2025

ExtraHop’s guide to the CISA AA24-109A advisory on the Akira ransomware group. See full MITRE ATT&CK TTPs, how Akira targets critical infrastructure, and how ExtraHop NDR defeats evasion and detects attacks in real-time, even within encrypted traffic.

cover image for Anthropic AI Attack: How NDR Detects GTG-1002 Cyber Espionage
Anthropic AI Attack: How NDR Detects GTG-1002 Cyber Espionage

November 24, 2025

The GTG-1002 Campaign: Anthropic Reveals the First AI-Orchestrated Cyber Espionage Attack

cover image for Healthcare Ransomware Defense: How NDR Stops Attacks Like Tufts & Eurofins
Healthcare Ransomware Defense: How NDR Stops Attacks Like Tufts & Eurofins

November 13, 2025

Deconstruct the Tufts Medicine & Eurofins ransomware attacks. Learn how NDR detects the advanced TTPs and lateral movement that perimeter security misses.

cover image for Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell
Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell

October 30, 2025

Anatomy of an Attack: Flax Typhoon’s ArcGIS Backdoor & NDR Detection

cover image for F5 Discloses Nation-State Attack on Cybersecurity Firm, Prompting CISA Emergency Order to Patch BIG-IP
F5 Discloses Nation-State Attack on Cybersecurity Firm, Prompting CISA Emergency Order to Patch BIG-IP

October 20, 2025

Beyond the Patch: Why NDR is Essential for Hunting the Nation-State Actor Inside Compromised F5 Networks

cover image for Ransomware Hits JLR Supply Chain, Results in Five Week Disruption
Ransomware Hits JLR Supply Chain, Results in Five Week Disruption

October 17, 2025

The JLR Ransomware Attack: A Supply Chain Under Siege

cover image for Iranian Cyber Actors Target U.S. Interests: A Heightened Alert for Critical Infrastructure
Iranian Cyber Actors Target U.S. Interests: A Heightened Alert for Critical Infrastructure

September 15, 2025

An urgent alert warns of escalating Iranian cyberattacks targeting U.S. critical infrastructure, leveraging disinformation, phishing, and DDoS. Proactive measures, including NDR solutions like ExtraHop RevealX, are crucial for defense against these evolving threats.

Explore Topics

magnifying glass icon
post image

See the Unseen: Detect Lateral Movement Within Encrypted Traffic

January 15, 2026

IDC research explains why traditional perimeters are blind to identity-driven threats. Learn how to expose attackers hiding in encrypted traffic to stop lateral movement before it turns into a breach.

Lateral MovementEncryptionIdentityIDCNDR
post image

Anatomy of an Attack

Anatomy of an Attack: European Cyber Threat Landscape: December 2025

January 14, 2026

Explore how specialized cyber operations in December 2025 weaponized BitLocker and used traffic mimicry to target critical infrastructure in Romania, France, and the UK. Learn how ExtraHop RevealX detects these "Living off the Land" tactics and supply chain breaches.

Anatomy of an Attack
post image

Data Rich, Insight Poor: The Hard Truth About Your Threat Intelligence Strategy

January 14, 2026

Most threat intelligence gives organizations the “mugshots” but not the “CCTV footage.” Learn why network context is essential for turning threat data into actionable security insights.

CybersecurityThreat IntelligenceNDR
post image

Anatomy of an Attack:

SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage

January 8, 2026

Stop the SHADOW-VOID-042 espionage campaign. See how this Void Rabisu-linked threat uses deceptive lures and zero-days. Learn how ExtraHop decodes 90+ protocols @ 100 Gbps to catch it.

Network SecurityAnatomy of an AttackDetections
post image

2026 and the Changing Threat Landscape: ExtraHop Predictions to Strengthen Your Cybersecurity Posture

December 23, 2025

ExtraHop experts share 2026 cybersecurity predictions, focusing on identity-based supply chain attacks, the shift toward strategic ransomware, and the impact of agentic AI on SOC modernization.

RansomwareSupply ChainIdentityAI
post image

Why Decryption is Necessary for Detecting Lateral Movement

December 19, 2025

Discover how full network context and decryption capabilities can eliminate the visibility gaps that enable threat actors.

Lateral MovementDwell TimeSalt TyphoonNetwork Visibility

Experience RevealX NDR for Yourself

Schedule a demo