Resources

Topics

How To Overcome Active Directory Exploits And Prevent Attacks
Webinars

According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threats and misconfigurations, and…

Prevent cyber attacks in Azure before they happen
Webinars

Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit these misconfigurations and, more…

The XM Cyber 2022 Attack Path Management Impact Report
Michael Greenberg | Blog

The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million entities to bring insights…

10 ways to gain control over Azure function app sites
Zur Ulianitzky and Bill Ben Haim | Blog

Pen-testers! Red-teamers! We’ve prepared a bucket of new Azure techniques, specifically about Azure function app sites. In this blog, we’ll show you new approaches…

XMGoat – An Open Source Pentesting Tool for Azure
Blog

  Overview We created XMGoat as an open source tool with the purpose of teaching penetration testers, red teamers, security consultants, and cloud experts…

Privilege Escalation and Lateral Movement on Azure – Part 2
Blog

Overview This is the second part of XM Cyber series about privilege escalation and lateral movement on Microsoft Azure. Some of the attacks that…

Privilege Escalation and Lateral Movement on Azure – Part 1
Blog

Overview XM Cyber features integrated support for Microsoft Azure. This support addresses attack techniques from on-premises environments to Azure cloud environments and vice versa….

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.