Blog

The Cloud is Just Half the Problem
Matthew Quinn | May 10, 2023

With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals. And not so surprisingly,…

Top 10 Favorite Cybersecurity Podcasts
Shahar Solomon | May 02, 2023

As a cybersecurity professional, it’s important for me to stay current and on top of trending events. But to be honest, the cyber world…

Why Focusing on Choke Points Can Help Solve Your Resource Constraints
Michael Greenberg | April 13, 2023

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult and overwhelming (to say…

CVE-2023-23397 – Outlook vulnerability
Zur Ulianitzky & David Azria & Bill Ben Haim | March 16, 2023

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs within Microsoft products. Exploiting…

CVE 2023-21716- Microsoft Word RCE
Zur Ulianitzky & David Azria & Bill Ben Haim | March 07, 2023

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was patched during February 2023…

Identity-based Exposures – 4 Ways to Prevent Them
Karin Feldman | March 07, 2023

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today, one of the most…

Continuous Compliance:

Where Security’s Rubber Meets Compliance’s Road

Shimon Becker | February 28, 2023

How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are actually two sides of…

How Financial Services Institutions Are Tackling Continuous Exposure Management
Ian Gallagher | February 20, 2023

Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4 times they uncovered attack…

From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware
Batya Steinherz | February 06, 2023

At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads of methods attackers leverage…

Attack Surface Reduction: 7 Expert Tips to Defend Your Organization
Batya Steinherz | January 11, 2023

Back in the day, networks used to be likened to castles – with strong, impenetrable walls and entrance strictly limited to authorized users through…

Extracting Encrypted Credentials from Common Tools
Zur Ulianitzky and David Azria | January 02, 2023

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine in order to move…

CVE-2022-42475 – Critical RCE Fortinet Vulnerability 
David Azria & Zur Ulianitzky | December 15, 2022

On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem, announced the discovery of…

1 2 3 4 5 23

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.