
Avigayil Stein, August 4th , 2022
4 Ways to Save Your SOC Analyst from Burn Out

Eyal Aharoni, August 1st , 2022
Cymulate’s July 2022 Cyberattacks Wrap-up

Ben Zilberman, July 27th , 2022
What is “Continuous Threat Exposure Management” in Gartner’s 2022 Hype Cycle

Mike Talon, July 21st , 2022
Cybersecurity 101: Anti-malware, EDR, MDR, Oh My!

Ben Zilberman, July 20th , 2022
Five Biggest Takeaways from Gartner Hype Cycle™️ for Security Operations 2022

Ruben Jami, July 14th , 2022
Cymulate’s Off-the-Shelf Sigma Rules to Lighten SOC Engineers’ Workload

Avigayil Stein, July 7th , 2022
How MSSPs Can Provide Better Value with Continuous Security Validation

Eyal Aharoni, July 4th , 2022
Cymulate’s June 2022 Cyberattacks Wrap-up

Eyal Aharoni, June 27th , 2022
How Extended Security Posture Management Empowers Every Security Team

Arien Seghetti, June 23rd , 2022
How Deep Does the MITRE Supply Chain Security System of Trust Framework Go?

Dan Lisichkin, June 22nd , 2022
Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190

Dave Klein, June 16th , 2022
2022 Cymulate Breaches Survey – Five Key Takeaways

Mike Talon, June 14th , 2022
Cybersecurity Scoring in Plain English: On a Scale From One to Ten

Eyal Wachsman, June 10th , 2022
How to Harden Security Posture With Shrinking Security Budgets

Yoni Leitersdorf, June 9th , 2022
What Verizon’s DBIR Tells us About Unauthorized Intrusion Readiness

Cymulate Research Lab, June 2nd , 2022
CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files

Eyal Aharoni, June 2nd , 2022
Cymulate’s May 2022 Cyberattacks Wrap-up

Patricia de Hemricourt, May 26th , 2022
From Automated Penetration Testing to Continuous Security Validation

Avigayil Stein, May 19th , 2022
3 Reasons Manufacturers Are a Prime Target for Cyberattacks

Ben Zilberman, May 12th , 2022