Resources

Topics

CVE-2023-23397 – Outlook vulnerability
Zur Ulianitzky & David Azria & Bill Ben Haim | Blog

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs within Microsoft products. Exploiting…

CVE 2023-21716- Microsoft Word RCE
Zur Ulianitzky & David Azria & Bill Ben Haim | Blog

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was patched during February 2023…

Extracting Encrypted Credentials from Common Tools
Zur Ulianitzky and David Azria | Blog

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine in order to move…

CVE-2022-42475 – Critical RCE Fortinet Vulnerability 
David Azria & Zur Ulianitzky | Blog

On December 12th, Fortinet, one of the foremost players in the firewall, AV, intrusion prevention systems, and endpoint security ecosystem, announced the discovery of…

XM Cyber Advisory – OpenSSL Critical Vulnerability
Zur Ulianitzky and David Azria | Blog

Overview According to the OpenSSL team, on November 1st, 2022, a new version, number 3.0.7 will be released (https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html). It’s interesting to note that…

XM Cyber Advisory – Follina, CVE-2022-30190, Zero Day
Zur Ulianitzky and Bill Ben Haim | Blog

On May 27, a new zero day critical vulnerability called Follina was discovered by the nao_sec security research team. The vulnerability resides in malicious…

Prevent cyber attacks in Azure before they happen
Webinars

Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit these misconfigurations and, more…

Decrypting VMware Workstation Passwords for Fun
David Azria & Zur Ulianitzky | Blog

Overview At XM Cyber, we have been hard at work on the techniques that attackers use against your VMware environments. What you’re about to…

XM Cyber Advisory – Spring4Shell, Zero Day
Zur Ulianitzky; Ilay Grossman | Blog

Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which…

New Privilege Escalation Techniques are Compromising your Google Cloud Platform
Idan Strovinsky, Zur Ulianitzky | Blog

In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand how an attacker exploits…

Go beyond Log4Shell and see the entire attack path with XM Cyber
Videos

We know you’re working tirelessly to get ahead of the log4j vulnerability. Here at XM Cyber, we can help you prioritize your remediation efforts…

Go Beyond Log4Shell and See the Entire Attack Path
Blog

We understand the facts: The most common open-source library (Java) has already been identified with 3 CVEs and counting, with over 3 million attacks…

1 2

Stop chasing vulnerabilities,
Start unraveling your exposures

See what attackers see, so you can stop them from doing what attackers do.