What Are Common Targets for Advanced Persistent Threats (APT)?

Common Targets for Advanced Persistent Threats (APT)

Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs are often state-sponsored, exceedingly well-resourced and highly capable in terms of technical ability. Many security teams, on the other hand, are understaffed, inadequately resourced and employ workers with varying degrees of competence. […]

How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and uses Artificial Intelligence (AI) tools to search for anomalies in network traffic. After six months, during which nothing significant appears to have happened, the organization becomes aware of a […]

Countermeasures for APT38

APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish several multi million dollar heists, and continue to pose a threat moving forward. But what is at the core of this APT?  And how do we defend against this group and […]

Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you can find the first post here). This post covers another real-life scenario we have experienced at one […]

How Breach and Attack Simulation Helps Enterprises

Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant on detecting and responding to immediate incidents. This approach may be suitable for some attacks, but it does not work well with slow-moving, stealthy APTs. For better defense, enterprises are starting to turn […]

XM Cyber Honored in 2018 CyberSecurity Breakthrough Award Program

Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and remediation platform, today announced that it has been selected as the winner of the “Overall APT Solution Provider of […]

Breach and Attack Simulation – Know Your Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art […]

What is proactive cyber defense?

Cybercrime is obstructing business and governments worldwide. No longer just an IT problem, it is the biggest threat to organizations’ reputation and business continuity. Research shows 54% of organizations experienced one or more attacks that compromised data or their infrastructure, and only a third of organizations believe they have adequate resources to manage security effectively. […]

Welcome Blog

We are excited to launch our blog and begin an ongoing conversation with you. Although we are officially launching these days, our journey began almost two years ago with the development of the HaXM system and its deployment at customer sites worldwide. THE XM CYBER JOURNEY So why did we start this journey in the […]