
Cymulate Research Lab
Our highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military, and intelligence experience. Continuously examining the cyber-threat landscape, our experts deliver in-depth visibility into today’s threats and the actors behind them.
Cymulate Research Lab Posts

December 2nd, 2024
Under the EDR Radar: A Deep Dive into Binary Exploitation
Read More

August 15th, 2024
Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD
Read More

February 14th, 2024
How Attackers Bypass EDR: Techniques and Countermeasures
Read More

February 14th, 2024
How Attackers Bypass EDR: Techniques & Defense Strategies
Read More

February 8th, 2024
EDR Bypass: How Today’s Tools Defend Against Malware
Read More

February 8th, 2024
Understanding Endpoint Defense: EDR, XDR, and Anti-Virus Explained
Read More
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe