The VXpose
Research Blog
Offensive security research, red team walkthroughs, and threat intelligence insights from the VXpose team.
Latest Post
AR, VR, and the Expanding Attack Surface of Immersive Technology
Extended reality platforms introduce novel attack vectors — sensor spoofing, spatial data exfiltration, and firmware exploitation — that most security programs aren't prepared for.
Sujith Rasnayaka
April 18, 2026 · 8 min read

The Dark Web Doesn't Sleep: Monitoring Credential Exposure in Real Time
How threat intelligence platforms track credential leaks, initial access broker markets, and ransomware group activity — and what your security team should do with that data.
Sujith Rasnayaka
April 10, 2026

Inside a Red Team Engagement: How We Breached a Hardened Network
A walk-through of a real-world red team operation — from initial recon to domain compromise — and the misconfigurations that made it possible.
Sujith Rasnayaka
April 1, 2026

WiFi Security in the Enterprise: What Your Analyzer Isn't Telling You
Modern WiFi analyzers visualize signal strength and channel overlap — but they miss the deeper threats lurking beneath the surface. Here's what to look for.
Sujith Rasnayaka
March 15, 2026