Resources

Extracting Encrypted Credentials from Common Tools
Zur Ulianitzky and David Azria | January 02, 2023

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine in order to move…

CVE-2022-42475 – Critical RCE Fortinet Vulnerability 
David Azria & Zur Ulianitzky | December 15, 2022

On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem, announced the discovery of…

2023: Time to Secure Active Directory and Azure AD
Menachem Shafran | December 11, 2022

Four key action items to harden AD and Azure AD in 2023 First introduced in 1999 as Microsoft Active Directory Domain Services for Windows…

Discover and Remediate Domain Credential Exposures

Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging…

Buyers Guide: Risk Exposure Reduction and Vulnerability Prioritization

2023 is almost here and security teams are focused on locking-in the funds needed to keep their orgs secured in the coming year. But…

2022 Customer Value Leadership Award 

Frost & Sullivan recognizes XM Cyber as the leader in Global Breach and Attack Simulation Market Excellence in Best Practices

Frost & Sullivan names XM Cyber a leader in Breach and Attack Simulation

Frost & Sullivan recently released their Frost Radar™ report on Breach and Attack Simulation and XM Cyber has achieved top rankings in categories for…

10 Cybersecurity Influencers to Follow – and Learn a Thing or Two From!
Menachem Shafran | November 28, 2022

The world of cybersecurity changes more frequently than most of us change our socks – and definitely more often than any of us change…

Cyber Exposure – What it Means for You and 4 Steps to Managing it
Dan Anconina | November 14, 2022

Cmon, as a cybersecurity leader, do you really need any stats to tell you that your job has never been more challenging?  No, probably…

Frost & Sullivan Recognizes XM Cyber as the Leader in Global Breach and Attack Simulation Market Excellence in Best Practices
November 05, 2022

Each year, global research and consulting firm Frost & Sullivan recognizes a variety of companies that truly define and set the model for the…

XM Cyber Advisory – OpenSSL Critical Vulnerability
Zur Ulianitzky and David Azria | October 31, 2022

Overview According to the OpenSSL team, on November 1st, 2022, a new version, number 3.0.7 will be released (https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html). It’s interesting to note that…

Continuous Controls Monitoring: Automatically Identifying Gaps in Security Controls
Michael Greenberg | October 25, 2022

Today, we are going to talk about something that might not score too high on anyone’s “Oh wow, I’ve been wondering about that” list….

1 8 9 10 11 12 35

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.