Blogs & Editorials

Stay up to date on cybersecurity

What is a Cyber Supply Chain Attack? A supply chain attack, which is also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. Supply Chain Connections Suppliers commonly have access to their customer’s networks to simplify the supply chain. […]
October 4, 2020
XM Cyber participó de la Tactical Edge LATAM 2020, una cumbre virtual con casi 2,000 asistentes de Latinoamérica acerca del mercado colombiano de ciberseguridad, realizada en línea del 22 al 25 de septiembre. Con el apoyo de nuestro socio colombiano, ARTSEC, nuestra presentación intitulada “Equipo Púrpura: El Futuro de los Incidentes de Ciberseguridad; la Convergencia […]
October 1, 2020
Digital Transformation: Enabling Your Defenders to See Like Their Attackers
Digital transformation is a phrase that gets bandied about often enough to almost qualify for the “buzzword” category. Yet scratch below the surface and you’ll see a weighty concept that articulates one of the most urgent challenges today’s organizations face. Namely, how to keep pace and evolve in a world that is digitalizing at breakneck […]
Tagged under: ,
September 21, 2020
Privilege Escalation and Lateral Movement on Azure
Overview XM Cyber features integrated support for Microsoft Azure. This support addresses attack techniques from on-premises environments to Azure cloud environments and vice versa. In this blog, we will show some techniques for how a red team can gain a foothold in an Azure environment. In addition, we will explore ways in which attackers escalate […]
September 16, 2020
XM Cyber welcomes you to the IT Security Insights 2020 event on October 13. Due the COVID-19 pandemic, the event’s fourth annual edition will be partly online and partly hosted in Stockholm, where participants can attend the conference in person. “Come meet us and learn more about our attack simulation platform that helps protect an organization’s […]
September 14, 2020
The modern cybersecurity battleground is delivering a new level of challenges for commercial enterprises and governmental institutions. Both entities are discovering the process of protecting and securing their most critical assets has become more difficult and complex. This translates to higher financial costs, greater risk from serious national security threats and even the specter of […]
Tagged under:
September 13, 2020
It’s been said that measuring something is the first step toward understanding, controlling and improving it. In the case of cybersecurity, that maxim finds its purest expression in the practice of risk assessments. These tools, also sometimes called audits, are a critical step toward maintaining an effective security posture — and one that remains in a state […]
Tagged under: ,
September 7, 2020
All Backend developers and other members of the Dev community are invited for the International JavaScript Conference on September 2-4. Due the COVID-19 pandemic, this year’s edition will be online. Tamar Twena, XM Cyber’s Backend Team Leader, will be your host at two talks: Implement Event Sourcing in Node.js Friday, September 4 2020 10:00 – […]
September 2, 2020
Cybersecurity professionals have never had it easy — but these days the game is definitely being played on expert mode. Threats aren’t only increasing in number, they are becoming more diverse and targeted. Machine learning, deepfake technology and false flag cyber-attacks may still be on the margins now, but all could soon create profound new […]
August 30, 2020
Common Types of APT Attack Vectors 
In the world of cybersecurity, few things send shudders down the spines of defenders like the words Advanced Persistent Threat (APT). The idea of being breached by a sophisticated APT is something close to a worst-case scenario. To help you understand why APTs are such a significant concern, let’s dive into what they are, how […]
Tagged under: ,
August 24, 2020