Resources

New Name, Same Risks: Two Microsoft Entra ID Attack Paths

For those not yet aware, Microsoft Entra ID is the new name for Azure AD, just announced this July. By…
Blog

2023: Time to Secure Active Directory and Azure AD

Four key action items to harden AD and Azure AD in 2023 First introduced in 1999 as Microsoft Active Directory…
Blog

How To Overcome Active Directory Exploits And Prevent Attacks

According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for…
Webinars

Prevent cyber attacks in Azure before they happen

Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit…
Webinars

The XM Cyber 2022 Attack Path Management Impact Report

The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million…
Blog

10 ways to gain control over Azure function app sites

  Pen-testers! Red-teamers! We’ve prepared a bucket of new Azure techniques, specifically about Azure function app sites. In this blog,…
Blog

XMGoat – An Open Source Pentesting Tool for Azure

  Overview We created XMGoat as an open source tool with the purpose of teaching penetration testers, red teamers, security…
Blog

Privilege Escalation and Lateral Movement on Azure – Part 2

Overview This is the second part of XM Cyber series about privilege escalation and lateral movement on Microsoft Azure. Some…
Blog

Privilege Escalation and Lateral Movement on Azure – Part 1

Overview XM Cyber features integrated support for Microsoft Azure. This support addresses attack techniques from on-premises environments to Azure cloud…
Blog

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.