Resources

2022’s Most Potent Attack Paths

Attackers don’t think like you do. They’re looking for ways to bypass your security controls and take advantage of various exposures that exist in…

How Financial Services Institutions Are Tackling Continuous Exposure Management
Ian Gallagher | February 20, 2023

Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4 times they uncovered attack…

Understanding ‘Lone Wolf’ Attacks Dissecting and Modeling 2022’s Most Powerful Cyber Attacks

The second half of 2022 saw a dramatic increase in ‘lone wolf’ attacks and can be coined one of the most common enterprise attack…

From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware
Batya Steinherz | February 06, 2023

At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads of methods attackers leverage…

IBM -Cyber Exposure Management Guide

IBM, in conjunction with XM Cyber created their new guide, Cyber Exposure Management: You Can’t Protect What You Don’t Know. It’s jam packed with…

Case study: Schwarz Group

Discover how Schwarz Group, the largest retailer in Europe, uses XM Cyber to see issues before they happen and then prioritize accordingly. Learn more…

Attack Surface Reduction: 7 Expert Tips to Defend Your Organization
Batya Steinherz | January 11, 2023

Back in the day, networks used to be likened to castles – with strong, impenetrable walls and entrance strictly limited to authorized users through…

Extracting Encrypted Credentials from Common Tools
Zur Ulianitzky and David Azria | January 02, 2023

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine in order to move…

CVE-2022-42475 – Critical RCE Fortinet Vulnerability 
David Azria & Zur Ulianitzky | December 15, 2022

On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem, announced the discovery of…

2023: Time to Secure Active Directory and Azure AD
Menachem Shafran | December 11, 2022

Four key action items to harden AD and Azure AD in 2023 First introduced in 1999 as Microsoft Active Directory Domain Services for Windows…

Discover and Remediate Domain Credential Exposures

Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging…

Buyers Guide: Risk Exposure Reduction and Vulnerability Prioritization

2023 is almost here and security teams are focused on locking-in the funds needed to keep their orgs secured in the coming year. But…

1 7 8 9 10 11 34

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.