Bienvenido al blog de Vectra

Información sobre cómo funciona la detección en entornos reales y cómo las tácticas cambiantes de los atacantes afectan a la capacidad de respuesta de su equipo.

Abril 3, 2026
-
Yusri Mohd Yusop
y
Detecting Compromise After the Axios Supply Chain Attack.

The axios supply chain compromise shows why risk begins after execution. Learn how to detect post-compromise behavior across CI/CD pipelines, identity systems, and network activity.

Seguir leyendo
Abril 2, 2026
-
Mark Wojtasiak
y
Who’s Doing What on Your Network?

Can you confidently answer who is doing what on your network? Learn why visibility into user activity is key to security, risk, and compliance.

Seguir leyendo
Abril 1, 2026
-
Lucie Cardiet
y
Breaking down the axios supply chain incident

A compromised npm package is only the entry point. The axios incident shows how quickly attackers pivot from code execution to credential abuse, identity misuse, and cloud access.

Seguir leyendo
Entradas de blog
Filtro
Claro