Resources

Topics

How to Combat Advanced Persistent Threats
Sharron Malaver | Blog

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection…

XM Cyber Advisory – Spring4Shell, Zero Day
Zur Ulianitzky; Ilay Grossman | Blog

Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which…

What Are Common Targets for Advanced Persistent Threats (APT)?
Blog

Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs…

How Advanced Persistent Threats Work
Blog

The term Advanced Persistent Threat, or APT, was apparently first coined at the United States Air Force in 2006 but joined the common vocabulary of…

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.