Newsroom

Do-it-yourself-Security statt abhängig sein
News

Mit dem Attack Path Management können wir nachvollziehen, welche Wege ein Angreifer im Unternehmensnetzwerk austestet, um zu den kritischen Assets zu gelangen und an…

Wir waren in der geheimen „Kommandozentrale“ der Lidl- und Kaufland-Mutter, von der aus Hacker bekämpft werden
News

Die Schwarz-Gruppe hatte Ende 2021 das israelische Cybersecurity-Unternehmen XM Cyber gekauft und bietet deren Hacker-Abwehr-System nun in ganz Deutschland an.

How XM Cyber technology can help organizations uncover attack paths and reduce risk.
News

Intel’s Darren Pulsipher, Chief Solutions Architect, and Paul Giorgi, Director of Sales Engineering, XM Cyber, discuss how XM Cyber technology can help organizations uncover…

Cybersecurity Context, Paul Giorgi – XM Cyber
News

Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context that is often sorely…

Seven Months After Acquisition by Schwarz Group, XM Cyber Acquires Cyber Observer         
Press Releases

Acquisition Extends Attack Path Management Platform Through Addition of Continuous Control Monitoring Innovator Herzliya, Israel, June 27, 2022 — XM Cyber, leader in hybrid…

Attack Paths: Just 4 Steps Can Compromise 94% of Assets
News

Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then…

Wider View of Attack Paths: Safeguarding Crown Jewels: Zur Ulianitzky XM Cyber
News

Attack Paths are not a new phenomenon. In simple terms, an attack path is identifying vulnerabilities that can be exploited by threat actors to…

XM Cyber Counters Attacks Involving Microsoft Active Directory Exploits
Press Releases

First Solution to Reveal Entire Attack Paths Across AD and Other Vectors,  Aiding Remediation and Continuously Protecting Critical Assets Herzliya, Israel, May 24, 2022…

Top attack techniques for breaching enterprise and cloud environments
News

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…

SOC modernization: 8 key considerations
News

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…

Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.
News

Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s…

94% of critical assets can be compromised within four steps of the initial breach point
News

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the…

1 2 3 23

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.