News

Top attack techniques for breaching enterprise and cloud environments
News

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…

SOC modernization: 8 key considerations
News

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…

Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.
News

Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s…

94% of critical assets can be compromised within four steps of the initial breach point
News

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the…

How many steps does it take for attackers to compromise critical assets?
News

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.

New and less known cybersecurity risks you should be aware of
News

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and less talked about cybersecurity risks organizations…

Four moves to ‘checkmate’ critical assets thanks to lax cloud security
News

Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report

A Few Clicks from Data Disaster: The State of Enterprise Security
News

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to…

Operationalizing a “think like the enemy” strategy
News

MITRE ATT&CK and new security technology innovation make this possible.

1 2 3 18

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.