ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

Welcome to the ExtraHop Blog

image representing the top featured blog post

The Mexican Government Breach Reveals What Attackers Can Do With AI Tools

March 12, 2026

An attacker used Claude and ChatGPT to breach multiple Mexican government agencies. Learn how AI-accelerated attacks outpace legacy monitoring and discover what continuous visibility makes possible
IdentityBehavioral DetectionNetwork Detection
lock Icon

Anatomy of an Attack

post image

From the Wire to the Data Center: Unmasking UNC5221 and the BRICKSTORM Backdoor

February 20, 2026

Discover how UNC5221 exploits vCenter and ADFS. See how ExtraHop RevealX decrypts authentication protocols to expose the threat actors.

cover image for DarkSpectre
DarkSpectre

February 4, 2026

Defend your supply chain against DarkSpectre’s evolving browser-based threats. This deep dive covers operational pillars like "The Zoom Stealer," MITRE ATT&CK TTPs, and actionable remediation strategies using allow-lists and network-centric security.

cover image for Anatomy of an Attack: European Cyber Threat Landscape: December 2025
Anatomy of an Attack: European Cyber Threat Landscape: December 2025

January 14, 2026

Explore how specialized cyber operations in December 2025 weaponized BitLocker and used traffic mimicry to target critical infrastructure in Romania, France, and the UK. Learn how ExtraHop RevealX detects these "Living off the Land" tactics and supply chain breaches.

cover image for SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage
SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage

January 8, 2026

Stop the SHADOW-VOID-042 espionage campaign. See how this Void Rabisu-linked threat uses deceptive lures and zero-days. Learn how ExtraHop decodes 90+ protocols @ 100 Gbps to catch it.

cover image for CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits
CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits

December 9, 2025

React2Shell (CVE-2025-55182) is a CVSS 10.0 RCE flaw in Next.js and React Server Components. See how ExtraHop NDR decrypts the payload and detects post-exploit credential theft.

cover image for Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK
Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK

December 8, 2025

ExtraHop’s guide to the CISA AA24-109A advisory on the Akira ransomware group. See full MITRE ATT&CK TTPs, how Akira targets critical infrastructure, and how ExtraHop NDR defeats evasion and detects attacks in real-time, even within encrypted traffic.

cover image for Anthropic AI Attack: How NDR Detects GTG-1002 Cyber Espionage
Anthropic AI Attack: How NDR Detects GTG-1002 Cyber Espionage

November 24, 2025

The GTG-1002 Campaign: Anthropic Reveals the First AI-Orchestrated Cyber Espionage Attack

cover image for Healthcare Ransomware Defense: How NDR Stops Attacks Like Tufts & Eurofins
Healthcare Ransomware Defense: How NDR Stops Attacks Like Tufts & Eurofins

November 13, 2025

Deconstruct the Tufts Medicine & Eurofins ransomware attacks. Learn how NDR detects the advanced TTPs and lateral movement that perimeter security misses.

cover image for Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell
Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell

October 30, 2025

Anatomy of an Attack: Flax Typhoon’s ArcGIS Backdoor & NDR Detection

cover image for F5 Discloses Nation-State Attack on Cybersecurity Firm, Prompting CISA Emergency Order to Patch BIG-IP
F5 Discloses Nation-State Attack on Cybersecurity Firm, Prompting CISA Emergency Order to Patch BIG-IP

October 20, 2025

Beyond the Patch: Why NDR is Essential for Hunting the Nation-State Actor Inside Compromised F5 Networks

Explore Topics

post image

The Mexican Government Breach Reveals What Attackers Can Do With AI Tools

March 12, 2026

An attacker used Claude and ChatGPT to breach multiple Mexican government agencies. Learn how AI-accelerated attacks outpace legacy monitoring and discover what continuous visibility makes possible

IdentityBehavioral DetectionNetwork Detection
post image

Anatomy of an Attack:

CHAOS in a BLACKSUIT—Triple Extortion Ransomware

March 11, 2026

Discover how the Chaos threat group utilizes triple extortion to pressure victims. See how ExtraHop RevealX provides the decryption and network visibility required to expose these stealthy attackers before data is leaked.

NDRThreat DetectionRevealXLateral MovementRansomware
post image

Why Technical Debt Has Become a Security Liability in the Age of AI

March 10, 2026

Technical debt is no longer just a backlog—it’s an operational and security concern. Learn why shadow legacy systems are increasingly in focus for AI-driven attackers and how network visibility supports modernization.

AISecurityNDRThreat Detection
post image

The Digital Front of Iranian Cyber Offensive Response

March 9, 2026

Analyze how Iranian threat actors like APT42 and MuddyWater are integrating Generative AI and memory-safe languages into their 2026 cyber offensive. This guide examines the "triple-threat" model of espionage and destructive hacktivism, detailing how ExtraHop RevealX uses protocol fluency and decryption to detect sophisticated backdoors like TAMECAT and CHAR.

NDRSecurity ThreatsRevealX
post image

5 Stealth Tactics Adversaries Use to Carry Out Their Attacks

February 26, 2026

Explore how attackers exploit encryption, opaque protocols, incomplete forensics, scale limitations, and fragmented tools — and how organizations detect and stop threats faster with unified visibility.

CybersecurityLateral MovementThreat DetectionEncryptionPacket CaptureSOCProtocol Analysis
post image

How AI is Accelerating Identity-Based Threats

February 20, 2026

AI is transforming identity-focused attacks and targeting valuable AI assets. Discover how integrated behavioral monitoring and real-time detection can stop threats.

CybersecurityIdentityCredentialsAIThreat DetectionLateral MovementBehavioral DetectionCloud SecurityNDR

Experience RevealX NDR for Yourself

Schedule a demo