Welcome to the XM Cyber Research Hub, where we offer you access to the leading minds in the field of cybersecurity. Our team is made up of a diverse group of experts from all around the world, including researchers, hackers, and seasoned cybersecurity professionals. By staying updated with the latest research from our team, you’ll gain valuable insights into the industry, be able to analyze the newest and most pressing threats, learn about preventative measures, and stay informed on the latest breakthroughs in attacks and hacking. Whether you’re a security professional, looking to improve your knowledge, or a company seeking to harden your defenses, XM Cyber is your source for staying ahead of the game in cybersecurity.
Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit these misconfigurations and, more…
Watch Webinar
At XM Cyber, we have been hard at work on the techniques that attackers use against your VMware environments.
Read More
We created XMGoat as an open source tool with the purpose of teaching penetration testers, red teamers, security consultants, and cloud experts how to abuse different misconfigurations within the Azure environment. In this way, you learn about common Azure security issues.
Read More
In this research, you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand how an attacker exploits this environment to gain permissions and steal information.
Read More
In this blog post, we will show how an attacker can extract non cleartext credentials in order to authenticate to databases and servers.
Read More
On March 30 2022, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which is running over Java Development Kit 9.0 (JDK9.0) and above. Spring Core on JDK9+ is vulnerable to remote code execution due to a bypass for CVE-2010-1622. While Spring4shell needs to be addressed as soon as possible, it is important to highlight that as it is a common library that is used by many different java software components, it can be a major breach point allowing attackers to build a lateral move pivoting to business-critical assets in the organization. As this develops, XM Cyber Research will share insights and guidance on the impact of this new zero day.
Read More
We understand the facts: The most common open-source library (Java) has already been identified with 3 CVEs and counting, with over 3 million attacks already confirmed in the wild. The industry anticipates the largest ransom wave to hit organizations across the world. The attacker is already inside! What’s Next?
Read More
On December 9th 2021, the Log4Shell vulnerability, CVE-2021-44228 (CVSS score 10), was discovered. This remote code execution (RCE) vulnerability was being exploited in the wild. Log4j is a logging library, and the vulnerability affects all products and applications that use log4j. That’s a lot of products.
Read More