Frequently Asked Questions
Cyberattack Trends & Threat Intelligence
What were the most significant cyberattacks in May 2022?
May 2022 saw a range of high-profile cyberattacks, including spear-phishing campaigns by the Lotus Panda APT group using Viper and ARL tools, exploitation of the Microsoft Office Follina zero-day vulnerability, Magecart skimming attacks on e-commerce sites, the Sysrv-K cryptomining worm, the Nerbian RAT targeting organizations in Europe, ZIP bomb tactics, and new Mirai botnet variants targeting IoT devices. These attacks highlight the evolving tactics of cybercriminals and the importance of continuous threat validation. Source
How did the Lotus Panda APT group conduct their attacks in May 2022?
The Lotus Panda group launched spear-phishing attacks using malware Viper and ARL (Asset Reconnaissance Lighthouse). The attack began with a malicious Word document, used macro code to extract embedded data, loaded shellcode, and injected a beacon into svchost.exe. The C2 server hosted the Viper framework and ARL dashboards for asset discovery and exploitation. Source
What is the Follina vulnerability and how was it exploited?
The Follina vulnerability (CVE-2022-30190) is a remote code execution flaw in the Microsoft Windows Support Diagnostic Tool (MSDT). In May 2022, Chinese-linked threat actors exploited this zero-day to execute malicious code on Windows systems via Office documents, impacting all supported Windows client and server platforms. Source
How did Magecart hackers target e-commerce sites in May 2022?
Magecart hackers injected JavaScript skimmers on checkout pages of e-commerce sites, including Germany-based Emma – The Sleep Company, to steal credit and debit card data. They also infiltrated site vendors, allowing them to compromise thousands of sites through a single vendor breach. Source
What is the Sysrv-K malware and how does it operate?
Sysrv-K is a worm and cryptocurrency miner that scans for vulnerable Tomcat, WebLogic, and MySQL services, exploits them with hard-coded password attacks, and deploys a Monero miner. It also searches WordPress files to take control of web servers and uses Telegram bots for communication. Source
How did the Nerbian RAT target organizations in May 2022?
The Nerbian RAT was distributed via COVID-19-themed phishing emails, primarily targeting organizations in Italy, Spain, and the UK. The malware used anti-VM techniques to evade detection, logged keystrokes, captured screenshots, and exfiltrated data to remote servers. Source
What is a ZIP bomb and how is it used by attackers?
A ZIP bomb is a maliciously crafted archive file that, when decompressed, consumes excessive system resources, potentially bypassing security controls and causing denial of service. Attackers deliver ZIP bombs via email to overwhelm victim systems. Source
How did the Mirai botnet evolve in May 2022?
In May 2022, Mirai botnet operators added new vulnerabilities and expanded support for hardware architectures, targeting IoT devices with ARM, x86, MIPS, Motorola 68K, Sparc, and PowerPC CPUs. 32-bit x86 variants became more common on Linux servers and networking equipment. Source
How can organizations test their exposure to recent cyberattacks?
Organizations can use Cymulate’s Immediate Threats assessment to test and verify exposure to the latest attacks. The platform provides actionable mitigation suggestions and indicators of compromise (IOCs) directly in the Cymulate UI. Source
What resources does Cymulate offer for staying updated on cyber threats?
Cymulate provides a regularly updated blog, a resource hub with whitepapers, guides, and data sheets, and a newsroom for media mentions. These resources help organizations stay informed about the latest threats and security trends. Blog | Resource Hub | Newsroom
Features & Capabilities
What is Cymulate’s Exposure Management Platform?
Cymulate’s Exposure Management Platform is a unified solution that integrates Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It enables organizations to proactively validate security controls, prioritize vulnerabilities, and optimize defenses against real-world threats. Learn more
What are the key features of Cymulate?
Key features include continuous threat validation, unified platform for BAS, CART, and Exposure Analytics, AI-powered optimization, complete kill chain coverage, attack path discovery, automated mitigation, cloud validation, and an intuitive, user-friendly interface. Source
Does Cymulate support integration with other security tools?
Yes, Cymulate integrates with numerous security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Crowdstrike Falcon LogScale, and Cybereason. For a full list, visit the Partnerships and Integrations page.
How does Cymulate help organizations prioritize vulnerabilities?
Cymulate ranks vulnerabilities based on exploitability, business context, and threat intelligence, enabling organizations to focus remediation efforts on the most critical exposures. This evidence-based prioritization improves operational efficiency and risk reduction. Learn more
What is Cymulate’s Immediate Threats assessment?
The Immediate Threats assessment allows organizations to test their exposure to the latest cyberattacks, verify defenses, and receive actionable mitigation suggestions. Indicators of compromise (IOCs) are available directly in the Cymulate UI. Source
How often is Cymulate’s threat library updated?
Cymulate provides the most advanced library of attack simulations with daily updates, ensuring customers stay ahead of emerging threats. Source
What technical documentation is available for Cymulate?
Cymulate offers whitepapers, guides, solution briefs, data sheets, and e-books covering its Exposure Management Platform, CTEM, detection engineering, and more. Access these resources in the Resource Hub.
How easy is Cymulate to use and implement?
Cymulate is praised for its intuitive, user-friendly interface and fast implementation. Customers report being able to deploy and start running simulations quickly, with minimal resources or technical expertise required. Customer quotes
What customer feedback has Cymulate received about ease of use?
Customers consistently highlight Cymulate’s ease of use, intuitive dashboard, and excellent support. For example, a Security Consultant described it as "very easy to understand," and a Cybersecurity Manager said, "All you need to do is click a few buttons, and you receive a lot of practical insights." Read more testimonials
Use Cases & Benefits
Who can benefit from using Cymulate?
Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as finance, healthcare, retail, and more. It is suitable for organizations of all sizes, from small businesses to large enterprises. Learn more
What business impact can customers expect from Cymulate?
Customers typically see a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. These metrics are based on real customer outcomes. Source
What core problems does Cymulate solve?
Cymulate addresses overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers for CISOs. It provides continuous threat validation, actionable insights, and unified exposure management. Source
How does Cymulate address persona-specific pain points?
Cymulate tailors solutions for CISOs (visibility, metrics), SecOps (efficiency, automation), red teams (scalable offensive testing), and vulnerability management (prioritization, resource constraints). Each persona benefits from features aligned to their unique challenges. Learn more
What is the primary purpose of Cymulate’s platform?
The primary purpose is to harden defenses and optimize security controls by proactively validating controls, threats, and response capabilities. Cymulate helps organizations focus on exploitable exposures and strengthen their overall security posture. Source
How does Cymulate help with lateral movement attack prevention?
Cymulate’s Attack Path Discovery automates testing for lateral movement, helping organizations identify and mitigate threats related to privilege escalation and lateral movement. For more, see the blog post Stopping Attackers in Their Tracks.
How does Cymulate support cloud security validation?
Cymulate provides dedicated validation features for hybrid and cloud environments, including integrations with AWS GuardDuty and Check Point CloudGuard, to ensure comprehensive cloud security validation. Learn more
What is Cymulate’s approach to continuous threat exposure management (CTEM)?
Cymulate evolves security practices into CTEM by integrating validation, prioritization, and mobilization with collaboration across teams, ensuring measurable improvements in threat resilience and operational efficiency. Learn more
Pricing & Plans
What is Cymulate’s pricing model?
Cymulate uses a subscription-based pricing model tailored to each organization’s needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a personalized quote, schedule a demo.
Competition & Comparison
How does Cymulate compare to AttackIQ?
Cymulate offers an industry-leading threat scenario library and AI-powered capabilities for streamlined workflows and accelerated security posture improvement. AttackIQ focuses on automated security validation but lacks Cymulate’s innovation, threat coverage, and ease of use. Read more
How does Cymulate compare to Mandiant Security Validation?
Mandiant is one of the original BAS platforms but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management as a grid leader. Read more
How does Cymulate compare to Pentera?
Pentera is useful for attack path validation but lacks the depth Cymulate provides for fully assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more
How does Cymulate compare to Picus Security?
Picus may suit organizations seeking a BAS vendor with an on-prem option. Cymulate offers a more complete exposure validation platform covering the full kill chain and cloud control validation. Read more
How does Cymulate compare to SafeBreach?
Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. It features the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more
How does Cymulate compare to Scythe?
Scythe is suitable for advanced red teams building custom attack campaigns. Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more
How does Cymulate compare to NetSPI?
NetSPI excels in penetration testing as a service (PTaaS). Cymulate is designed for continuous, independent assessment and strengthening of defenses, recognized as a leader in exposure validation by Gartner and G2. Read more
Security, Compliance & Company Information
What security and compliance certifications does Cymulate hold?
Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating its commitment to security, privacy, and cloud service best practices. Learn more
How does Cymulate ensure product security and compliance?
Cymulate employs secure AWS data centers, strong encryption (TLS 1.2+ and AES-256), a robust SDLC, continuous vulnerability scanning, annual penetration tests, and ongoing employee security training. It is GDPR-compliant and has a dedicated privacy and security team. Learn more
What is Cymulate’s company background?
Founded in 2016, Cymulate has a presence in 8 global locations, serves customers in 50 countries, and is trusted by over 1,000 organizations. The company is recognized for continuous innovation and measurable impact in cybersecurity. About Us
What is Cymulate’s vision and mission?
Cymulate’s mission is to revolutionize cybersecurity by fostering a proactive approach to managing threats, empowering organizations to improve resilience and manage their security posture effectively. Learn more
Support & Resources
Where can I find Cymulate’s blog?
You can stay updated on the latest threats, new Cymulate research, and more on our blog. Recent topics include CVE-2026-20965 and steps to become ransomware resilient.
How can I subscribe to the Cymulate blog?
To subscribe, you need to provide your full name, email address, and country of residence. Privacy Policy
Where can I find Cymulate’s newsroom?
Cymulate’s media mentions and bylines in leading publications are available in our newsroom.
Where can I find Cymulate’s resource hub?
All resources, including insights, thought leadership, and product information, are available in our Resource Hub.
How can I stay updated with the latest news and research from Cymulate?
Visit the company blog for the latest threats and research, and check the Newsroom for media mentions and press releases.