Blog

Insights that keep you ahead

Explore expert perspectives, practical tips, and the latest trends shaping the cybersecurity landscape.

The Exabots are on strike (this is fine)
Product
April 1, 2026

The Exabots are on strike (this is fine)

Exaforce is no longer agentic as of this morning. Our MDR team is overcaffeinated and as ready as possible.

There’s a bot in my boot! Finding if hackerbot-claw tried tampered with your workflows
Research
March 11, 2026

There’s a bot in my boot! Finding if hackerbot-claw tried tampered with your workflows

An autonomous AI bot exploited misconfigured CI/CD workflows to steal credentials and compromise repositories. Here's what happened, how it worked, and what to detect.

What can this compromised user actually do? Why effective permissions are a cornerstone of accurate threat analysis
Product
March 4, 2026

What can this compromised user actually do? Why effective permissions are a cornerstone of accurate threat analysis

Resolving effective permissions across SaaS and IaaS is harder than it looks, and essential for accurate blast radius and threat context

Rethinking MSSP repatriation: AI SOCs, in-house builds, and the middle ground
Industry
February 17, 2026

Rethinking MSSP repatriation: AI SOCs, in-house builds, and the middle ground

AI SOC has changed the math on build vs. buy. Here's why we see some teams pulling SecOps back in-house, while for some, it still makes sense to outsource.

The Phishing Matryoshka: Unpacking a BEC to AiTM Nested Attack Chain
Research
January 28, 2026

The Phishing Matryoshka: Unpacking a BEC to AiTM Nested Attack Chain

How attackers leveraged trusted services to deploy an AiTM attack that captured credentials and session tokens despite MFA protections.

The breach already inside: Operationalizing insider risk management
Product
January 21, 2026

The breach already inside: Operationalizing insider risk management

How AI-powered security platforms detect the insider threats that traditional tools consistently miss, and why context makes all the difference.

7 predictions for the security landscape in 2026
Industry
January 13, 2026

7 predictions for the security landscape in 2026

The threat model is shifting. Identity, SaaS, and supply chains are the new front line.

Exaforce Agentic SOC 2025 year in review
Industry
Product
December 29, 2025

Exaforce Agentic SOC 2025 year in review

2025 year in review reveals what happens inside modern SOCs, from overwhelming cloud telemetry to which alerts deserve human time.

When trusted third parties behave like threat actors
Customer Story
December 19, 2025

When trusted third parties behave like threat actors

When risky support activity triggers every signal of a real breach, and why identity-centric detection is the only way to get the full details.

The Call Is Coming from Inside the House: 6 Strategies for Insider Risk
Industry
December 16, 2025

The Call Is Coming from Inside the House: 6 Strategies for Insider Risk

How context-aware AI is replacing static thresholds in modern insider threat programs

Lessons from the hallways at my first AWS re:Invent
Industry
December 8, 2025

Lessons from the hallways at my first AWS re:Invent

What hallway conversations and roundtables at re:Invent revealed about real-world cloud security.

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security
Customer Story
November 25, 2025

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Automated, context-aware detection caught a multi-vector Google Workspace account takeover in minutes.

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud
Research
November 24, 2025

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

A deep dive into the new variant of Shai-Hulud malware, credential theft techniques, and GitHub Actions abuse targeting modern development pipelines.

How an AI SOC turns Anthropic’s intelligence report into daily defense
Industry
November 11, 2025

How an AI SOC turns Anthropic’s intelligence report into daily defense

Turning Anthropic’s findings on AI-powered cybercrime into practical defense; how an AI-driven SOC detects, investigates, and responds faster.

Your AI-driven threat hunting is only as good as your data platform and pipeline
Industry
November 6, 2025

Your AI-driven threat hunting is only as good as your data platform and pipeline

AI threat hunting only works with a unified, high fidelity security data platform and pipeline.

The log rings don’t lie: historical enumeration in plain sight
Research
November 5, 2025

The log rings don’t lie: historical enumeration in plain sight

How attackers can weaponize audit logs for enumeration in AWS, Azure, and GCP environments.

The past, present, and future of security detections
Product
October 29, 2025

The past, present, and future of security detections

Modern detection goes beyond static rules by understanding the signals that reveal intent, context, and emerging threats.

We’re HITRUST certified: strengthening trust across cloud-native SOC automation
Product
October 16, 2025

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

Demonstrating verified, auditable, and industry-recognised security through HITRUST e1 certification.

GPT needs to be rewired for security
Industry
October 9, 2025

GPT needs to be rewired for security

How a deterministic, multi-model engine delivers reliable SOC automation outcomes, including real-time triage, fewer false positives, and reduced MSSP/MDR dependence.

Aggregation redefined: Reducing noise, enhancing context
Product
October 8, 2025

Aggregation redefined: Reducing noise, enhancing context

From duplicates to attack chains, Exaforce redefines aggregation so analysts see fewer alerts, each with more context and clarity.

Exaforce selected to join the 2025 AWS Generative AI Accelerator
News
Product
October 7, 2025

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Exaforce is honored to be part of AWS’s global program supporting the most promising generative AI startups.

Do you feel in control? Analysis of AWS CloudControl API as an attack tool
Research
October 2, 2025

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Abusing AWS CloudControl API to stealthily enumerate resources, persist in accounts, and evade detection.

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation
News
September 25, 2025

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

GigaOm compared 19 vendors across key features, emerging features, and business criteria dimensions.

How agentic AI simplifies GuardDuty incident response playbook execution
Industry
September 24, 2025

How agentic AI simplifies GuardDuty incident response playbook execution

Agentic AI automates GuardDuty playbook steps, shrinking hours of log stitching and identity checks into minutes for faster, consistent response.

There’s a snake in my package! How attackers are going from code to coin
Research
September 10, 2025

There’s a snake in my package! How attackers are going from code to coin

How attackers hijacked popular NPM packages to replace crypto wallet addresses and silently redirect funds.

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence
Research
September 9, 2025

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Exploring the risks of Google Apps Script abuse, from cryptomining to stealthy service accounts, and ways to detect misuse.

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI
Customer Story
September 3, 2025

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

s1ngularity supply chain attack: What happened & how Exaforce protected customers
Industry
August 27, 2025

s1ngularity supply chain attack: What happened & how Exaforce protected customers

How the s1ngularity attack exploited Nx packages and how Exaforce verified zero exposure.

Introducing Exaforce MDR: A Managed SOC That Runs on AI
Product
News
August 26, 2025

Introducing Exaforce MDR: A Managed SOC That Runs on AI

An MDR service that uses agentic AI and expert analysts at every stage of the SOC lifecycle, so you get faster response, better coverage, and a SOC that understands your business.

Meet Exaforce: The full-lifecycle AI SOC platform
News
Product
August 26, 2025

Meet Exaforce: The full-lifecycle AI SOC platform

Launching the Exaforce agentic AI SOC platform: full-lifecycle security operations with automated detection, triage, investigation, and response. Empower small teams to create a SOC or enable mature SOCs to scale coverage and speed without increasing headcount

Building trust at Exaforce: Our journey through security and compliance
Product
August 21, 2025

Building trust at Exaforce: Our journey through security and compliance

How Exaforce made trust a launch requirement by embedding security and compliance from day one

Fixing the broken alert triage process with more signal and less noise
Industry
August 7, 2025

Fixing the broken alert triage process with more signal and less noise

A look at how AI is changing the SOC triage process from automated false positive classification to clearer handoffs and deeper context for Tier 2 and 3 analysts.

Evaluate your AI SOC initiative
Product
July 16, 2025

Evaluate your AI SOC initiative

A maturity mapped question framework to benchmark AI SOC platforms on detection, triage, investigation, response, and service quality.

One LLM does not an AI SOC make
Industry
July 10, 2025

One LLM does not an AI SOC make

LLMs have the potential to improve SOC processes, but they’re not enough on their own. This blog explores why AI SOCs need pre-processing and a new design to add value.

Detections done right: Threat detections require more than just rules and anomaly detection
Industry
June 24, 2025

Detections done right: Threat detections require more than just rules and anomaly detection

Discover how Exaforce fuses logs, config & identity into an AI-powered graph that improves on legacy and naive detection techniques.

The KiranaPro breach: A wake-up call for cloud threat monitoring
Industry
June 10, 2025

The KiranaPro breach: A wake-up call for cloud threat monitoring

Practical takeaways and best practices in the aftermath of the KiranaPro breach.

3 points missing from agentic AI conversations at RSAC
Industry
May 29, 2025

3 points missing from agentic AI conversations at RSAC

Agentic AI tools for security operations centers promise to enhance—not replace—human analysts, but their true value lies in thoughtful integration, deep context, and rigorous proof-of-concept testing, not hype-driven adoption.

5 reasons why security investigations are broken - and how Exaforce fixes them
Product
May 27, 2025

5 reasons why security investigations are broken - and how Exaforce fixes them

Struggling with alert overload or slow triage? Discover 5 reasons security investigations fail—and how Exaforce uses AI to fix them fast.

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring
Product
May 7, 2025

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

This blog examines common cloud security anti-patterns and offers actionable guidance, including practical remediation measures, to continuously monitor, detect, and effectively respond to emerging threats.

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations
News
Product
April 17, 2025

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Announcing our $75M Series A to fuel our mission

Safeguarding against Github Actions(tj-actions/changed-files) compromise
Industry
March 16, 2025

Safeguarding against Github Actions(tj-actions/changed-files) compromise

How users can detect, prevent, recover from supply chain threats with Exaforce

Npm provenance: bridging the missing security layer in JavaScript libraries
Industry
November 6, 2024

Npm provenance: bridging the missing security layer in JavaScript libraries

Why verifying package origins is crucial for secure JavaScript applications

Exaforce’s response to the LottieFiles npm package compromise
Industry
November 1, 2024

Exaforce’s response to the LottieFiles npm package compromise

Analyzing the supply chain attack and steps taken to secure the ecosystem

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Exaforce Author Joe Milliken
Exaforce Author Andrew Green
Trusted by SOCs from next-gen startups to global enterprises

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you