News

Topics

Top 20 Breach and Attack Simulation (BAS) Vendors for 2022

This roundup dives into the best in the BAS market, from the top-tier solutions to companies on the rise and…
News

Cybersecurity Context, Paul Giorgi – XM Cyber

Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context…
News
Attack Paths: Just 4 Steps Can Compromise 94% of Assets

Attack Paths: Just 4 Steps Can Compromise 94% of Assets

Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access…
News

Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques…
News

SOC modernization: 8 key considerations

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with…
News

Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.

Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa…
News

94% of critical assets can be compromised within four steps of the initial breach point

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and…
News

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud…
News
newsroom

New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and…
News
newsroom

Four moves to ‘checkmate’ critical assets thanks to lax cloud security

Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report
News
newsroom

A Few Clicks from Data Disaster: The State of Enterprise Security

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from…
News
https://www.csoonline.com/article/3652597/operationalizing-a-think-like-the-enemy-strategy.html

Operationalizing a “think like the enemy” strategy

MITRE ATT&CK and new security technology innovation make this possible.
News
1 5 6 7 8 9 24

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.