ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

Welcome to the ExtraHop Blog

image representing the top featured blog post

The Anthropic MCP Flaw is a Wake-Up Call: 3 Steps to Secure the Agentic Frontier

April 27, 2026

Anthropic’s Model Context Protocol (MCP) has a fundamental design flaw. Discover the three strategic priorities organizations must adopt to secure their AI supply chain and eliminate agentic blind spots.
AIAI AgentsSupply ChainNetwork Visibility
lock Icon

Anatomy of an Attack

post image

The Copy Fail: Linux Kernel Local Privilege Escalation

May 4, 2026

Uncover the "Copy Fail" logic flaw (CVE-2026-31431) that enables instant root access on nearly all major Linux distributions. Learn how this vulnerability bypasses file integrity monitoring and why network-based behavioral analysis is critical for securing containerized and cloud environments.

cover image for The MIMICRAT CLICKFIX Campaign
The MIMICRAT CLICKFIX Campaign

April 28, 2026

Expose how the MIMICRAT campaign weaponizes compromised financial sites and ClickFix lures to deploy fileless malware. See how ExtraHop RevealX provides the network-level ground truth to detect telemetry suppression and stealthy C2 patterns that bypass EDR.

cover image for The Chrysalis Backdoor and the Notepad++ Supply Chain Hijack
The Chrysalis Backdoor and the Notepad++ Supply Chain Hijack

April 6, 2026

Unmask the Chrysalis backdoor and the sophisticated Notepad++ supply chain hijack orchestrated by Lotus Blossom. Learn how these state-sponsored attackers bypass traditional defenses and why network-level visibility is the ultimate key to stopping them.

cover image for CHAOS in a BLACKSUIT—Triple Extortion Ransomware
CHAOS in a BLACKSUIT—Triple Extortion Ransomware

March 11, 2026

Discover how the Chaos threat group utilizes triple extortion to pressure victims. See how ExtraHop RevealX provides the decryption and network visibility required to expose these stealthy attackers before data is leaked.

cover image for From the Wire to the Data Center: Unmasking UNC5221 and the BRICKSTORM Backdoor
From the Wire to the Data Center: Unmasking UNC5221 and the BRICKSTORM Backdoor

February 20, 2026

Discover how UNC5221 exploits vCenter and ADFS. See how ExtraHop RevealX decrypts authentication protocols to expose the threat actors.

cover image for DarkSpectre
DarkSpectre

February 4, 2026

Defend your supply chain against DarkSpectre’s evolving browser-based threats. This deep dive covers operational pillars like "The Zoom Stealer," MITRE ATT&CK TTPs, and actionable remediation strategies using allow-lists and network-centric security.

cover image for Anatomy of an Attack: European Cyber Threat Landscape: December 2025
Anatomy of an Attack: European Cyber Threat Landscape: December 2025

January 14, 2026

Explore how specialized cyber operations in December 2025 weaponized BitLocker and used traffic mimicry to target critical infrastructure in Romania, France, and the UK. Learn how ExtraHop RevealX detects these "Living off the Land" tactics and supply chain breaches.

cover image for SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage
SHADOW-VOID-042 Campaign Uses Deceptive Update Lures in Targeted Global Espionage

January 8, 2026

Stop the SHADOW-VOID-042 espionage campaign. See how this Void Rabisu-linked threat uses deceptive lures and zero-days. Learn how ExtraHop decodes 90+ protocols @ 100 Gbps to catch it.

cover image for CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits
CVE-2025-55182: How ExtraHop Detects React2Shell RCE Exploits

December 9, 2025

React2Shell (CVE-2025-55182) is a CVSS 10.0 RCE flaw in Next.js and React Server Components. See how ExtraHop NDR decrypts the payload and detects post-exploit credential theft.

cover image for Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK
Defeating Akira Ransomware: Full CISA Advisory Breakdown with ExtraHop NDR and MITRE ATT&CK

December 8, 2025

ExtraHop’s guide to the CISA AA24-109A advisory on the Akira ransomware group. See full MITRE ATT&CK TTPs, how Akira targets critical infrastructure, and how ExtraHop NDR defeats evasion and detects attacks in real-time, even within encrypted traffic.

Explore Topics

post image

Your Cloud Provider's Security Logs Aren't Your Security Record: The Cost of Filtered Cloud Visibility

May 4, 2026

Close the cloud visibility gap. Learn why relying on provider logs creates security blind spots and how independent network telemetry restores authoritative evidentiary control.

NDRSecurityNetwork Security
post image

Anatomy of An attack

The Copy Fail: Linux Kernel Local Privilege Escalation

May 4, 2026

Uncover the "Copy Fail" logic flaw (CVE-2026-31431) that enables instant root access on nearly all major Linux distributions. Learn how this vulnerability bypasses file integrity monitoring and why network-based behavioral analysis is critical for securing containerized and cloud environments.

Cloud SecurityCybersecurityNetwork Detection and ResponseNDRThreat IntelligenceAnatomy of an Attack
post image

Inside the EU Commission Breach: The Role of Compromised Credentials in the Trivy Supply Chain Attack

May 4, 2026

Get a breakdown of how a compromised Trivy update allowed attackers to steal credentials, create new access keys, and move laterally across the European Commission's cloud environment and see what organizations can learn from it.

IdentitySupply ChainCybersecurityLateral Movement
post image

Anatomy of an Attack

The MIMICRAT CLICKFIX Campaign

April 28, 2026

Expose how the MIMICRAT campaign weaponizes compromised financial sites and ClickFix lures to deploy fileless malware. See how ExtraHop RevealX provides the network-level ground truth to detect telemetry suppression and stealthy C2 patterns that bypass EDR.

Anatomy of an AttackNetwork DetectionNDRRevealXThreat Hunting
post image

The 84% Blind Spot: Why Attackers Love Your 'Trusted' Admin Tools

April 28, 2026

The m odern enterprise security perimeter has morphed into a complex fabric of identity-centric access and administrative protocols. The most significant risk …

Network Detection and ResponseNetwork VisibilityThreat Hunting
post image

The Anthropic MCP Flaw is a Wake-Up Call: 3 Steps to Secure the Agentic Frontier

April 27, 2026

Anthropic’s Model Context Protocol (MCP) has a fundamental design flaw. Discover the three strategic priorities organizations must adopt to secure their AI supply chain and eliminate agentic blind spots.

AIAI AgentsSupply ChainNetwork Visibility

Experience RevealX NDR for Yourself

Schedule a demo