![image](https://cymulate.com/uploaded-files/2022/03/research-team.png)
Cymulate Research Lab
Our highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military, and intelligence experience. Continuously examining the cyber-threat landscape, our experts deliver in-depth visibility into today’s threats and the actors behind them.
Cymulate Research Lab Posts
![image](https://cymulate.com/uploaded-files/2024/12/img-6-1-414x205.png)
December 2nd, 2024
Under the EDR Radar: A Deep Dive into Binary Exploitation
Read More
![image](https://cymulate.com/uploaded-files/2024/11/img-18-414x127.png)
August 15th, 2024
Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD
Read More
![cymulate article](https://cymulate.com/uploaded-files/2024/12/img-22-1-414x205.png)
February 14th, 2024
EDR Bypass Part 2: Techniques
Read More
![image](https://cymulate.com/uploaded-files/2024/12/img-33-1-414x205.png)
February 14th, 2024
How Attackers Bypass EDR: Techniques & Defense Strategies
Read More
![Cymulate helps you understand the ArcaneDoor campaign](https://cymulate.com/uploaded-files/2024/02/EDR-e1707387263330.jpeg)
February 8th, 2024
EDR Bypass Part 1: Understanding Today’s Tools
Read More
![image](https://cymulate.com/uploaded-files/2024/02/tools.png)
February 8th, 2024
Understanding Endpoint Defense: EDR, XDR, and Anti-Virus Explained
Read More
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe