Resources

Topics

How to Combat Advanced Persistent Threats
Sharron Malaver | Blog

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection…

XM Cyber Advisory – Spring4Shell, Zero Day
Zur Ulianitzky; Ilay Grossman | Blog

Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which…

What Are Common Targets for Advanced Persistent Threats (APT)?
Blog

Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs…

How Advanced Persistent Threats Work
Blog

The term Advanced Persistent Threat, or APT, was apparently first coined at the United States Air Force in 2006 but joined the common vocabulary of…

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.