<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cortex XDR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cortex-xdr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 23:13:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cortex-xdr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Expanding Detection Beyond Endpoints to Counter Evolving Threats</title><link>https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</link><pubDate>Fri, 01 May 2026 23:13:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</guid><description>Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.</description><content:encoded><![CDATA[<p>The 2026 Unit 42 Global Incident Response Report highlights that threat actors are moving 4x faster to exfiltration than in 2025, exploiting blind spots due to an over-reliance on endpoint data. The proliferation of cloud services, microservices, and remote users has expanded the attack surface beyond what any single tool can monitor. Unit 42 found that in 75% of incidents, critical evidence was present in logs but wasn&rsquo;t accessible or operationalized, allowing attackers to exploit the gaps. Organizations need to evolve their SOCs to ingest and correlate telemetry across their entire IT landscape, including IAM, cloud assets, OT/IoT, and AI workloads. Unit 42 recommends a single-pane-of-glass strategy powered by an AI-driven SOC platform like Cortex XSIAM to combat these threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Cloud Misconfiguration:</strong> The attacker gains initial access through a misconfigured cloud service access key.</li>
<li><strong>Cloud Console Manipulation:</strong> The attacker manipulates the cloud console to hide their tracks from endpoint detection.</li>
<li><strong>Pivot to Cloud-Hosted Server:</strong> From the cloud console, the attacker pivots to a cloud-hosted server to begin discovery.</li>
<li><strong>Credential Theft (Covert C2):</strong> The attacker utilizes DNS tunneling to a cloud storage location for C2 communication and steals credentials to use legitimate applications.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally using the stolen credentials, triggering impossible travel alerts across SaaS apps.</li>
<li><strong>Rogue Asset Introduction:</strong> The attacker introduces a rogue device into the network, bypassing traditional endpoint security measures.</li>
<li><strong>Persistence:</strong> The attacker maintains persistence through the rogue device, using it for covert movement and access.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data, taking advantage of the gaps in security visibility.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations are increasingly vulnerable to rapid data exfiltration due to the expanded attack surface and reliance on endpoint-centric security. The inability to correlate telemetry across diverse IT zones allows attackers to operate undetected, leading to significant data breaches, financial losses, and reputational damage. Unit 42&rsquo;s research shows that attackers are moving 4x faster to exfiltration, exacerbating the impact of successful intrusions. The attacks target cloud environments, identity systems, and networks, creating a complex threat landscape for security teams to navigate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest and correlate telemetry from all IT zones (IAM, cloud, OT/IoT, AI workloads) into a single repository, as described in the overview, to eliminate data silos and gain holistic visibility.</li>
<li>Implement User and Entity Behavior Analytics (UEBA) as mentioned in the overview, to detect anomalous behavior indicative of compromised credentials by using a centralized workbench.</li>
<li>Deploy Cortex XSIAM, as discussed in the overview, to leverage AI-driven alert stitching, ML-based incident scoring, and UEBA for automated detection, investigation, and response.</li>
<li>Implement continuous network monitoring and external attack surface management to detect and manage rogue assets, as highlighted in the attack chain.</li>
<li>Evaluate your current visibility through a formal assessment as recommended in the conclusion, to identify gaps in security coverage.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud-security</category><category>iam</category><category>incident-response</category><category>threat-detection</category></item></channel></rss>