XM Cyber Counters Attacks Involving Microsoft Active Directory Exploits
Top attack techniques for breaching enterprise and cloud environments
SOC modernization: 8 key considerations
Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.
94% of critical assets can be compromised within four steps of the initial breach point
How many steps does it take for attackers to compromise critical assets?
New and less known cybersecurity risks you should be aware of
Four moves to ‘checkmate’ critical assets thanks to lax cloud security
A Few Clicks from Data Disaster: The State of Enterprise Security
XM Cyber Research Finds That Hackers Can Claim ‘Checkmate’ on 94% of Critical Assets in Just Four Moves
Operationalizing a “think like the enemy” strategy
See XM Cyber In Action