Welcome to the Vectra Blog

Insights into how detection holds up in real environments and how changing attacker tactics impact your team’s response capabilities.

April 1, 2026
Lucie Cardiet
and
Breaking down the axios supply chain incident

A compromised npm package is only the entry point. The axios incident shows how quickly attackers pivot from code execution to credential abuse, identity misuse, and cloud access.

Read more
March 23, 2026
Lucie Cardiet
and
Detecting Sliver C2: When Advanced Beaconing Tries to Hide in Plain Sight

Detect how Sliver C2 evades traditional beacon detection and how behavioral AI identifies command-and-control activity hidden in encrypted traffic.

Read more
March 19, 2026
Lucie Cardiet
and
Mauro Paredes
Prompt Control: How Context Becomes the Command-and-Control Layer for AI Agents

Prompt control turns AI agents into command-and-control systems by manipulating context, memory, and inputs—enabling persistent, stealthy attacker control through normal agent behavior.

Read more
Blog Posts
Filter
Clear