Frequently Asked Questions

Threats & Malware Campaigns

What happened in the malware campaign targeting Italy described on this page?

An information stealer malware campaign targeted end users in Italy via phishing emails with an "Invoice" subject. The attack used LNK files to deliver a password-protected archive containing a malicious batch script and another LNK file. When executed, these files launched a PowerShell command to run a remote script, dropped additional files for persistence, and exfiltrated crypto wallets, browser data, and system information. Source

How do information stealer malware campaigns typically operate?

Information stealer malware campaigns often use phishing emails to trick users into downloading malicious files. These files may execute scripts that collect sensitive data such as crypto wallets, browser credentials, and system information, then exfiltrate it to attackers. The campaign described targeted Italian users with invoice-themed phishing and used LNK and batch scripts for execution and persistence. Source

What types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain, including phishing, malware, lateral movement, data exfiltration, and zero-day exploits. The platform uses daily updated threat templates and AI-generated attack plans to ensure comprehensive coverage. Source

How does Cymulate help organizations respond to new malware campaigns?

Cymulate enables organizations to quickly assess their exposure to new malware campaigns by running automated simulations that mimic the latest attack techniques. The platform's immediate threats module is updated rapidly, allowing security teams to test defenses against emerging threats and implement remedial actions quickly. Source

What feedback have penetration testers given about Cymulate's immediate threats module?

Penetration testers have praised Cymulate's immediate threats module for its speed and relevance. One tester noted, "I am particularly enamored with the immediate threats module and how quickly this gets updated. In short, if an attack is new, you can quickly assess your IT estate for how much of a risk is posed to you and implement remedial action quickly." Source

What types of cyber threats does the financial services sector face?

The financial services sector is consistently targeted by sophisticated cyber threats, including ransomware, phishing, and advanced persistent threats (APTs). These attacks require robust security controls to protect both internal systems and customer-facing applications. Source

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, AI-powered optimization, complete kill chain coverage, attack path discovery, automated mitigation, cloud validation, and ease of use. Source

How does Cymulate's 'Threat (IoC) updates' feature improve threat resilience?

The 'Threat (IoC) updates' feature provides recommended Indicators of Compromise (IoCs) that can be directly applied to security controls. These can be exported via the UI or API in plain text or STIX format, enabling control owners to build defenses against new threats quickly. Source

What is threat exposure prioritization in cybersecurity?

Threat exposure prioritization is the process of identifying and ranking vulnerabilities and security weaknesses based on their actual exploitability and impact on business-critical assets. Cymulate uses automated threat validation and exposure scoring to help teams focus on exposures not protected by security controls. Source

How does Cymulate automate mitigation of threats?

Cymulate integrates with security controls to push threat updates and build custom detection rules for immediate prevention. This automation helps organizations respond faster to new threats and reduces manual workload. Source

What integrations does Cymulate support?

Cymulate integrates with numerous security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, CrowdStrike Falcon LogScale, and Cybereason. For a full list, visit the Partnerships and Integrations page.

What technical documentation is available for Cymulate?

Cymulate provides whitepapers, guides, solution briefs, data sheets, and e-books covering its Exposure Management Platform, CTEM, threat detection, vulnerability management, and more. Access the full resource library at the Resource Hub.

How often is Cymulate's threat library updated?

Cymulate's threat library is updated daily with new attack simulations and threat intelligence, ensuring customers can validate defenses against the latest threats. Source

Does Cymulate support cloud and hybrid environment validation?

Yes, Cymulate provides dedicated validation features for hybrid and cloud environments, allowing organizations to assess and strengthen their security posture across on-premises and cloud infrastructure. Source

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as media, transportation, financial services, retail, and healthcare. Organizations of all sizes, from small businesses to enterprises, can benefit from its platform. Source

What business impact can customers expect from using Cymulate?

Customers typically see a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in team efficiency, 40X faster threat validation, an 85% improvement in threat detection accuracy, and an 81% reduction in cyber risk within four months. Source

What are some real-world case studies demonstrating Cymulate's value?

Examples include Hertz Israel reducing cyber risk by 81% in four months, Nemours Children's Health increasing visibility and detection, a financial services organization automating risk measurement across 10+ entities, and Globeleq addressing tool fragmentation. See more at the Customers page.

How does Cymulate address the pain points of different security personas?

Cymulate tailors its solutions for CISOs (visibility, metrics, investment justification), SecOps (operational efficiency, automation), red teams (scalable offensive testing), and vulnerability management teams (prioritization, resource optimization). Each persona receives targeted features and reporting. Source

What core problems does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volume, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers by providing continuous validation, automation, and actionable insights. Source

How does Cymulate's platform help with communication between security and business stakeholders?

Cymulate provides validated exposure scoring and quantifiable metrics, enabling CISOs and security leaders to communicate risk and justify investments to business stakeholders effectively. Source

Implementation & Ease of Use

How long does it take to implement Cymulate?

Cymulate's implementation is fast and straightforward. Customers report being able to deploy and integrate Cymulate quickly, often in just a few clicks, with minimal resources required. Source

How easy is Cymulate to use for new users?

Cymulate is praised for its intuitive, user-friendly dashboard and ease of use. Customers highlight the platform's simplicity, quick onboarding, and accessible support as key factors in their positive experience. Source

What support resources are available for Cymulate customers?

Cymulate provides comprehensive support, including email and chat support, webinars, e-books, a knowledge base, and technical documentation to ensure a smooth onboarding and ongoing experience. Source

What do customers say about Cymulate's ease of use?

Customers consistently praise Cymulate for its ease of use, intuitive dashboard, and effective support. Testimonials highlight the platform's simplicity, quick deployment, and actionable insights. Source

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate is SOC2 Type II certified, ISO 27001:2013, ISO 27701, ISO 27017 compliant, and holds CSA STAR Level 1 certification. These attest to its robust security, privacy, and cloud service controls. Source

How does Cymulate ensure data security and privacy?

Cymulate hosts services in secure AWS data centers, uses strong encryption (TLS 1.2+ in transit, AES-256 at rest), and follows a strict Secure Development Lifecycle (SDLC). It also complies with GDPR and employs a dedicated privacy and security team. Source

Is Cymulate compliant with GDPR?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. Source

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate offers an industry-leading threat scenario library, AI-powered capabilities, and ease of use. AttackIQ focuses on automated security validation but lacks Cymulate's innovation, threat coverage, and workflow acceleration. Read more

How does Cymulate compare to Mandiant Security Validation?

Mandiant is an original BAS platform but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management and recognized as a grid leader. Read more

How does Cymulate compare to Pentera?

Pentera is useful for attack path validation but lacks Cymulate's depth for fully assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more

How does Cymulate compare to Picus Security?

Picus may suit organizations seeking a BAS vendor with an on-prem option. Cymulate offers a more complete exposure validation platform covering the full kill chain and cloud control validation. Read more

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. It features the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns. Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more

How does Cymulate compare to NetSPI?

NetSPI excels in penetration testing as a service (PTaaS). Cymulate is designed for continuous, independent assessment and strengthening of defenses, recognized as a leader in exposure validation by Gartner and G2. Read more

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a quote, schedule a demo with Cymulate's team.

Company Information & Vision

When was Cymulate founded?

Cymulate was established in 2016. Source

How many customers does Cymulate serve?

Cymulate serves over 1,000 customers in 50 countries, with a presence in 8 global locations. Source

What is Cymulate's mission and vision?

Cymulate's mission is to revolutionize how companies approach cybersecurity by fostering a proactive stance against threats. The company empowers organizations to manage their security posture effectively and improve resilience. Source

How does Cymulate's product contribute to its vision?

Cymulate's Exposure Management Platform proactively validates security posture, optimizes controls, enables continuous threat exposure management (CTEM), and fosters collaboration across security teams, helping organizations move from guessing to knowing and acting on threats. Source

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Italy Targeted By Information Stealer Malware

January 17, 2023

An un-named information stealer was targeting end users in Italy through a phishing campaign using an "Invoice" themed subject to deliver an LNK file. Once the LNK file was clicked the unsuspecting recipient was led to download a password protected archive file containing a malicious batch script as well as an additional LNK file. Executing the LNK file, contained in the archive, spawned a PowerShell command that attempted to run a script file directly from a URL via the MSHTA binary. Additional files were dropped which led to the malware setting up persistence on the target machine and the collection of crypto wallets, web browser data, and system information that the threat actors could then exfiltrate for later use.