{
	"id": "ae9eef71-7314-4a12-b440-631267d4f940",
	"created_at": "2026-04-06T00:19:39.658445Z",
	"updated_at": "2026-04-12T02:22:32.921875Z",
	"deleted_at": null,
	"sha1_hash": "fe9723f4ced527aef649938304f8b17ede3d3499",
	"title": "Vectra AI Cybersecurity Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 593698,
	"plain_text": "Vectra AI Cybersecurity Blog\r\nBy and\r\nArchived: 2026-04-02 10:53:42 UTC\r\nPlatform\r\nSee how modern attackers exploit gaps in your defenses and what you can do to stop them.\r\nStop attacker progression\r\nEnforced containment across identity, devices, and network traffic with 360 Response.\r\nLearn more\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 1 of 6\n\nCompare the Vectra AI Platform against other tools\r\nEDR, SIEM, SASE, SSE, and native cloud security tools leave gaps modern attackers exploit. The Vectra AI\r\nPlatform closes them.\r\nLearn more\r\nStop attacker progression\r\nEnforced containment across identity, devices, and network traffic with 360 Response.\r\nLearn more\r\nCompare the Vectra AI Platform against other tools\r\nEDR, SIEM, SASE, SSE, and native cloud security tools leave gaps modern attackers exploit. The Vectra AI\r\nPlatform closes them.\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 2 of 6\n\nLearn more\r\nStop attacker progression\r\nEnforced containment across identity, devices, and network traffic with 360 Response.\r\nLearn more\r\nCompare the Vectra AI Platform against other tools\r\nEDR, SIEM, SASE, SSE, and native cloud security tools leave gaps modern attackers exploit. The Vectra AI\r\nPlatform closes them.\r\nLearn more\r\nCustomers\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 3 of 6\n\nVectra AI is named a Leader in the 2025 Gartner® Magic Quadrant™ for NDR\r\nNDR is no longer optional — it's a must for catching modern attacks. Learn why Gartner recognized Vectra AI as\r\na Leader in both vision and ability to execute.\r\nDownload\r\nResearch \u0026 Insights\r\nExpert insights from our data scientists, security researchers, and engineers to support your learning.\r\nAI Research\r\nGet AI insights for smarter threat detection\r\nJoin our security researchers, data scientists, and analysts as we share 11+ years of security-AI research and\r\nexpertise with the global cybersecurity community.\r\nResources\r\nBreaking news and expert insights.\r\nBlue Team Workshops, on-demand webinars and global events near you.\r\nJoin our security researchers, data scientists, and analysts as we share 11+ years of security-AI research and\r\nexpertise with the global cybersecurity community.\r\nResearch reports, attack anatomies, white papers, guides, datasheets and customer stories.\r\nDetailed explanations of today's most critical cybersecurity issues, attacker techniques, and mitigation strategies.\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 4 of 6\n\nSee the Vectra AI Platform in action.\r\nSee how integrated signal from Vectra AI lets you see and stop sophisticated attacks other technologies miss.\r\nTake the interactive tour\r\nCompany\r\nSee why we’re the world leader in AI security\r\nRequest an intro with a Vectra AI security expert\r\nDeployment guides, knowledge base, release notes and security announcements\r\nExpert insight from security researchers, data scientists and engineers\r\nBreaking news from Vectra AI\r\nPress materials, leadership bios, logos and product images for media use\r\nJoin the team behind the world’s first AI-based cybersecurity platform\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 5 of 6\n\nBeyond Configuration Perfection: Redefining ‘Cloud Security’\r\nFixing misconfigurations isn’t enough. Over-focusing on perfection can create blind spots. Discover a smarter,\r\nholistic approach to cloud security.\r\nRead more\r\nSource: https://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nhttps://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks\r\nPage 6 of 6",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.vectra.ai/blogpost/moonlight-middle-east-targeted-attacks"
	],
	"report_names": [
		"moonlight-middle-east-targeted-attacks"
	],
	"threat_actors": [],
	"ts_created_at": 1775434779,
	"ts_updated_at": 1775960552,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fe9723f4ced527aef649938304f8b17ede3d3499.pdf",
		"text": "https://archive.orkl.eu/fe9723f4ced527aef649938304f8b17ede3d3499.txt",
		"img": "https://archive.orkl.eu/fe9723f4ced527aef649938304f8b17ede3d3499.jpg"
	}
}