Resources

Understanding ‘Lone Wolf’ Attacks Dissecting and Modeling 2022’s Most Powerful Cyber Attacks

The second half of 2022 saw a dramatic increase in ‘lone wolf’ attacks and can be coined one of the…
Webinars

From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware

At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads…
Blog

IBM -Cyber Exposure Management Guide

IBM, in conjunction with XM Cyber created their new guide, Cyber Exposure Management: You Can’t Protect What You Don’t Know.…
eBooks & Whitepapers

Case Study: Granting Schwarz Group Proof of an Attack Before it Happens

Discover how Schwarz Group, the largest retailer in Europe, uses XM Cyber to see issues before they happen and then…
Case Studies

Attack Surface Reduction: 7 Expert Tips to Defend Your Organization

Back in the day, networks used to be likened to castles – with strong, impenetrable walls and entrance strictly limited…
Blog

Extracting Encrypted Credentials from Common Tools

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine…
Blog

CVE-2022-42475 – Critical RCE Fortinet Vulnerability 

On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem,…
CVE Advisory

2023: Time to Secure Active Directory and Azure AD

Four key action items to harden AD and Azure AD in 2023 First introduced in 1999 as Microsoft Active Directory…
Blog

Discover and Remediate Domain Credential Exposures

Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have…
Webinars

Buyers Guide: Risk Exposure Reduction and Vulnerability Prioritization

2023 is almost here and security teams are focused on locking-in the funds needed to keep their orgs secured in…
eBooks & Whitepapers

10 Cybersecurity Influencers to Follow – and Learn a Thing or Two From!

The world of cybersecurity changes more frequently than most of us change our socks – and definitely more often than…
Blog

Cyber Exposure – What it Means for You and 4 Steps to Managing it

Cmon, as a cybersecurity leader, do you really need any stats to tell you that your job has never been…
Blog
1 20 21 22 23 24 47

Request a demo

See what attackers see, so you can stop them from doing what attackers do.