Chaining together Active Directory attack techniques to give your organization the edge against attackers
Decrypting VMware Workstation Passwords for Fun
Our security is only as strong as our ability to manage it: The necessity of Attack Path Management for the Hybrid Cloud
The XM Cyber 2022 Attack Path Management Impact Report
5 Ways to Make Attack Path Management More Manageable
XM Cyber Advisory – Spring4Shell, Zero Day
New Privilege Escalation Techniques are Compromising your Google Cloud Platform
See All Ways: How to Overcome the Big Disconnect in Cybersecurity
10 ways to gain control over Azure function app sites
Choosing Attack Path Management Over Security Control Validation When Shopping for Breach & Attack Simulation
Go Beyond Log4Shell and See the Entire Attack Path
Attack Path vs Attack Vector: Important Differences You Need To Know
See XM Cyber In Action