Resources

Threat intelligence, case studies, and security research from the Intruex team.

Featured Article

Two Chinese state-sponsored campaigns — Volt Typhoon and Salt Typhoon — have spent years inside US critical infrastructure and every major US telecom. The alerts fired. The investigation didn’t happen.

5 years
Max Volt Typhoon Dwell Time
200+
Salt Typhoon Victim Orgs
9
US Telecoms Breached
80
Countries Affected

Living in the Walls: Why Volt Typhoon and Salt Typhoon Dwell in Critical Infrastructure for Years

Two Chinese state-sponsored campaigns. Hundreds of victims. Five-year dwell times inside communications, energy, water, and transportation networks. We analyze CISA advisories AA24-038A and AA25-239A — and why the common thread isn’t broken detection, but missing investigation.

Apr 2026 · 12 min read Read Article
Article

The 2026 Ransomware Surge

Ransomware operators are shutting down trauma centers, paralyzing city governments, and disrupting medical device supply chains. An analysis of four early-2026 attacks and why traditional SOC models can’t contain them before detonation.

Apr 2026 · 10 min read Read Article
Article

SIEM vs SOAR vs XDR vs AI SOC

What each security operations technology actually does, where they overlap, and how to choose the right combination for your organization.

2026 · 12 min read Read Article
Article

How One Hacker Used AI to Breach an Entire Government

A single attacker used a $20/month AI subscription to breach 9 government agencies and exfiltrate 150GB of sensitive data. We break down every phase and show where AI-powered SOC detection would have intervened.

Feb 2026 · 12 min read Read Article
Article

How Attack Narrative Correlation Works

Learn how Intruex automatically correlates related security alerts into unified attack campaigns, maps them to MITRE ATT&CK kill chain phases, and generates analyst-ready narratives.

2025 · 8 min read Read Article
Article

The AI SOC Buyer's Guide

What to look for when evaluating AI-powered SOC platforms. Covers agent architecture, deployment flexibility, compliance mapping, and the difference between AI-assisted and AI-autonomous operations.

2025 · 10 min read Read Article
Article

Air-Gapped AI: Securing Classified Environments

How Intruex delivers the same AI-powered security operations in fully disconnected networks using self-hosted LLMs and local inference — no cloud dependency required.

2025 · 7 min read Read Article

See Intruex in Action

Want to see how AI-powered SOC operations detect threats that traditional tools miss? Let's talk.