Welcome to the Vectra Blog

Insights into how detection holds up in real environments and how changing attacker tactics impact your team’s response capabilities.

May 13, 2026
5/13/2026
Lucie Cardiet
and
Shai-Hulud Part 2: When the Worm Forged Its Own Security Certificate

TeamPCP open-sourced Shai-Hulud today. The OIDC token extraction technique that made the TanStack attack different from every previous campaign is now a public toolkit.

Read more
May 11, 2026
5/11/2026
Gearóid Ó Fearghaíl
and
Improve SIEM and SOAR Workflows with Better Security Signal

Learn how Vectra AI improves SIEM and SOAR workflows with behavior-driven signal, investigation-ready telemetry, and better security orchestration.

Read more
May 6, 2026
5/6/2026
Lucie Cardiet
and
Aakash Gupta
ShinyHunters isn’t a group. It’s a pattern.

ShinyHunters isn't a single group. It's a pattern of attacks where authentication succeeds. Here's how to detect them before the data warehouse.

Read more
Blog Posts
Filter
Clear