Blog

Stay up to date on cybersecurity

BLOG
How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as white hat pentesting, a penetration test detects and exploits vulnerabilities throughout your network and infrastructure. While pentesting overlaps with red team exercises—to the point where some people think the concepts are […]
Tagged under:
With thousands attendees from financial institutions anticipated to come this year, FS-ISAC Fall Summit 2018 taking place in Chicago, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be sponsoring the “All Day Cafe” and attending FS-ISAC […]
APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish several multi million dollar heists, and continue to pose a threat moving forward. But what is at the core of this APT?  And how do we defend against this group and […]
Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you can find the first post here). This post covers another real-life scenario we have experienced at one […]
Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant on detecting and responding to immediate incidents. This approach may be suitable for some attacks, but it does not work well with slow-moving, stealthy APTs. For better defense, enterprises are starting to turn […]
Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and remediation platform, today announced that it has been selected as the winner of the “Overall APT Solution Provider of […]
We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning of “hygiene,” which comes from the Greek “hygieine techne.” It means “the healthful art,” Enterprise IT Hygiene is crucial if you want to […]
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art […]
With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending HLS […]
I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are based on the concept of – offense and defense.  In Jiu-Jitsu, you need to have a good offense along with […]