Identity-based Exposures – 4 Ways to Prevent Them
Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today, one of the most…
Want to save >$14M over 3 years?
Nearly every enterprise on the planet has tools to address vulnerabilities. But how can you understand the ROI of your efforts? We commissioned Forrester…
Continuous Compliance:
Where Security’s Rubber Meets Compliance’s Road
How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are actually two sides of…
2022’s Most Potent Attack Paths
Attackers don’t think like you do. They’re looking for ways to bypass your security controls and take advantage of various exposures that exist in…
How Financial Services Institutions Are Tackling Continuous Exposure Management
Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4 times they uncovered attack…
Understanding ‘Lone Wolf’ Attacks Dissecting and Modeling 2022’s Most Powerful Cyber Attacks
The second half of 2022 saw a dramatic increase in ‘lone wolf’ attacks and can be coined one of the most common enterprise attack…
From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware
At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads of methods attackers leverage…
IBM -Cyber Exposure Management Guide
IBM, in conjunction with XM Cyber created their new guide, Cyber Exposure Management: You Can’t Protect What You Don’t Know. It’s jam packed with…
Case Study: Granting Schwarz Group Proof of an Attack Before it Happens
Discover how Schwarz Group, the largest retailer in Europe, uses XM Cyber to see issues before they happen and then prioritize accordingly. Learn more…
Attack Surface Reduction: 7 Expert Tips to Defend Your Organization
Back in the day, networks used to be likened to castles – with strong, impenetrable walls and entrance strictly limited to authorized users through…
Extracting Encrypted Credentials from Common Tools
Overview During our day to day research, we face the question of what can be extracted from a compromised machine in order to move…
CVE-2022-42475 – Critical RCE Fortinet Vulnerability
On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem, announced the discovery of…