Frequently Asked Questions

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's unique requirements. The subscription fee depends on the chosen package, the number of assets covered, and the scenarios selected for testing and validation. For a detailed quote, you can schedule a demo with the Cymulate team.

How is Cymulate's subscription fee determined?

The subscription fee is determined by the specific features and capabilities included in your selected package, the number of assets you wish to cover, and the scenarios and simulations you choose for testing and validation. This flexible model ensures scalability for organizations of all sizes.

How can I get a Cymulate pricing quote?

To receive a customized pricing quote based on your organization's needs, you can schedule a demo with Cymulate's team. They will assess your requirements and provide a tailored proposal.

Features & Capabilities

What are the key features of Cymulate's platform?

Cymulate's platform offers continuous threat validation, unified Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), exposure analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, an intuitive interface, and an extensive threat library with over 100,000 attack actions updated daily. Learn more about the platform.

Does Cymulate support automated attack simulations?

Yes, Cymulate provides 24/7 automated attack simulations to validate your security posture in real-time, helping organizations stay ahead of emerging threats and continuously improve their defenses.

What is Cymulate's threat library?

Cymulate's threat library contains over 100,000 attack actions aligned to the MITRE ATT&CK framework and is updated daily with the latest threat intelligence, ensuring comprehensive and up-to-date simulations.

Does Cymulate offer attack path discovery and lateral movement testing?

Yes, Cymulate provides automated attack path discovery and lateral movement testing to identify potential attack paths, privilege escalation, and lateral movement risks within your environment. Learn more about attack path discovery.

How does Cymulate help with exposure prioritization?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, enabling organizations to focus on the most critical vulnerabilities. Learn more about exposure prioritization.

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit our Partnerships and Integrations page.

Does Cymulate provide automated mitigation capabilities?

Yes, Cymulate integrates with security controls to push updates for immediate prevention of threats, enabling automated mitigation and faster response to emerging risks. Learn more about automated mitigation.

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds several key certifications, including SOC2 Type II (covering security, availability, confidentiality, and privacy), ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security Controls), and CSA STAR Level 1 (Cloud Controls Matrix). Learn more about security at Cymulate.

How does Cymulate ensure data security?

Cymulate ensures data security through encryption for data in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and robust application security practices including secure development lifecycle, vulnerability scanning, and third-party penetration testing.

Is Cymulate GDPR compliant?

Yes, Cymulate is GDPR compliant. The platform incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO).

What product security features does Cymulate offer?

Cymulate's platform includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center, ensuring robust access and data security.

Use Cases & Benefits

Who can benefit from Cymulate?

Cymulate is designed for CISOs and security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more about roles.

What problems does Cymulate solve?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. See customer stories.

How does Cymulate help organizations improve their security posture?

Cymulate enables organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture, resulting in measurable improvements such as up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. Read the Hertz Israel case study.

Are there case studies showing Cymulate's impact?

Yes, Cymulate has numerous case studies demonstrating its impact, such as Hertz Israel reducing cyber risk by 81% in four months, a sustainable energy company scaling penetration testing, and a credit union optimizing SecOps. Explore all case studies.

How does Cymulate address pain points for different personas?

Cymulate tailors solutions for each persona: CISOs get quantifiable metrics for investment justification, SecOps teams benefit from automation and efficiency, Red Teams access advanced offensive testing, and Vulnerability Management teams automate validation and prioritization. Learn more about tailored solutions.

Technical Requirements & Implementation

How long does it take to implement Cymulate?

Cymulate is designed for rapid deployment. It operates in agentless mode, requiring no additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment.

How easy is it to get started with Cymulate?

Cymulate is praised for its ease of use and quick implementation. Users can begin leveraging its capabilities with just a few clicks, and the platform integrates seamlessly into existing workflows. Customer testimonials highlight its intuitive dashboard and immediate value.

What support options does Cymulate provide?

Cymulate offers comprehensive support, including email support ([email protected]), real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for instant answers and guidance.

What resources are available to help new users?

New users have access to a knowledge base, webinars, e-books, and an AI chatbot to help them get started and optimize their use of the platform. Visit the Resource Hub for more information.

Customer Experience & Proof

What do customers say about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive interface and ease of use. Testimonials highlight the platform's user-friendly dashboard, immediate value, and accessible support. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Read more testimonials.

What measurable outcomes have Cymulate customers achieved?

Cymulate customers have reported a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. These outcomes are supported by case studies such as Hertz Israel and others. See all case studies.

Where can I find Cymulate customer reviews and ratings?

You can read customer reviews and ratings on Cymulate's reviews page, as well as on third-party platforms like Gartner Peer Insights and G2.

Competition & Comparison

How does Cymulate differ from other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and exposure analytics, continuous 24/7 threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and proven customer outcomes. It also offers the most advanced attack simulation library with daily updates. See Cymulate vs competitors.

What advantages does Cymulate offer for different user segments?

Cymulate provides CISOs with quantifiable metrics, SecOps teams with automation and efficiency, Red Teams with advanced offensive testing, and Vulnerability Management teams with automated validation and prioritization. Solutions are tailored to each role's needs. Learn more about tailored solutions.

Product Information & Company Background

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity. Learn more about Cymulate.

What is Cymulate's company background and market position?

Cymulate is a leading cybersecurity company serving organizations of all sizes and industries. It is recognized as a market leader in automated security validation and was named a Customers' Choice in the 2025 Gartner Peer Insights. Learn more about Cymulate.

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to help organizations proactively validate their cybersecurity defenses, identify vulnerabilities, and optimize their security posture, empowering security teams to stay ahead of emerging threats and improve resilience. Learn more.

Resources & Research

Where can I find Cymulate's blog and newsroom?

You can stay updated with the latest threats, research, and company news through our blog and our newsroom.

Where can I find resources like whitepapers, product info, and thought leadership articles?

Cymulate's Resource Hub is a central location for insights, thought leadership, and product information. Access it at our Resource Hub.

How can I stay updated with the latest news and research from Cymulate?

Stay informed by visiting the company blog for the latest threats and research, and the Newsroom for media mentions and press releases.

Does Cymulate provide educational resources like a blog, glossary, or resource hub?

Yes, Cymulate offers a variety of educational resources, including a Resource Hub, a blog, and a cybersecurity glossary. Visit the Resource Hub or the glossary.

Do you have a blog post about preventing lateral movement attacks?

Yes, Cymulate has a blog post titled 'Stopping Attackers in Their Tracks' that discusses common lateral movement attacks and how to prevent them. Read the blog post.

Where can I find a central hub for Cymulate's insights, thought leadership, and product information?

All of Cymulate's resources, including insights, thought leadership, and product information, are available in the Resource Hub.

AWS SSM Agent Vulnerability: Cymulate Researcher Uncovers Critical Flaw

Yes, Cymulate researchers have uncovered a critical vulnerability in the AWS SSM Agent. You can watch the detailed explanation in this video: AWS SSM Agent Vulnerability: Cymulate Researcher Uncovers Critical Flaw video.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Exploiting BadSuccessor: Cymulate Launches New Advanced Breach Simulation Scenario 

By: Miryam Adjiashvili Shdema

Last Updated: March 17, 2026

cymulate blog article

At Cymulate, our mission is to stay ahead of evolving threats by transforming cutting-edge research into real-world security testing tools.  

Today, we're excited to unveil a new breach simulation scenario that automates the detection and exploitation of BadSuccessor, a powerful Active Directory (AD) privilege escalation technique discovered by Yuval Gordon, Security Researcher at Akamai. 

This simulation enables security teams to proactively test their environment against a threat vector that’s already been found to affect a staggering number of real-world AD deployments.  

Check out Gordon’s full original research at the link above for a deeper dive into the technical underpinnings of the exploit. 

What Is BadSuccessor? 

BadSuccessor is an Active Directory vulnerability tied to Delegated Managed Service Accounts (dMSAs), a feature newly introduced in Windows Server 2025. The flaw stems from how AD processes dMSA migrations, allowing an attacker to simulate a migration process and gain the privileges of virtually any user in the domain, including Domain Admins

The Attack Mechanism 

The exploitation relies on manipulating two key AD attributes: 

msDS-ManagedAccountPrecededByLink 
msDS-DelegatedMSAState 

By creating a rogue dMSA and setting these attributes, an attacker tricks the Key Distribution Center (KDC) into generating a Privilege Attribute Certificate (PAC) that includes the SIDs and group memberships of the “superseded” account, which could be the Administrator itself. 

This means an attacker with only OU-level permissions can escalate privileges dramatically, without needing access to privileged credentials. 

What Cymulate Built 

To empower organizations to test their defenses against this novel attack, Cymulate has developed a fully automated BadSuccessor Breach Simulation Scenario. This scenario mimics an attacker’s steps using real-world tactics and tools - all in a safe, controlled environment. 

The Scenario Includes: 

  1. Discovery Phase: Scans Active Directory to locate Organizational Units (OUs) where low-privileged users have CreateChild, GenericAll or similar over-permissive rights. 
  2. Enumeration & Validation: Filters potential targets based on known exploitation criteria (as outlined in Akamai’s research). 
  3. Exploitation: Uses SharpSuccessor, a publicly available PoC, to craft a rogue dMSA and perform the privilege escalation chain. 

BadSuccessor Breach Simulation Scenario

BadSuccessor Breach Simulation Scenario

Who’s at Risk of BadSuccessor? 

According to Akamai’s data: 

“In 91% of the environments we examined, we found users outside the domain admins group that had the required permissions to perform this attack.” - Yuval Gordon, Akamai 

You’re likely vulnerable if: 

  • Your environment includes at least one Windows Server 2025 Domain Controller
  • You’ve delegated OU permissions (e.g., to Helpdesk, DevOps, or Automation accounts). 
  • You allow unrestricted dMSA creation in AD. 

How to Detect and Mitigate BadSuccessor 

Detection Strategies 

To detect exploitation attempts, enable auditing for the following: 

  • Event ID 5137 – Creation of msDS-DelegatedManagedServiceAccount objects. 
  • Event ID 5136 – Modifications to msDS-ManagedAccountPrecededByLink 
  • Event ID 2946 – Authentication events involving dMSAs (in Directory Service log). 

Mitigation Best Practices 

Until Microsoft releases an official patch, reduce your exposure with these steps: 

  • Restrict permissions like CreateChild and GenericAll across all OUs. 
  • Limit dMSA creation rights to essential service accounts only. 
  • Use BloodHound, PowerView, or other AD ACL analysis tools to audit and fix overly permissive configurations. 

Why BadSuccessor Matters 

BadSuccessor is not just theoretical - it's dangerously easy to exploit. With minimal permissions, attackers can: 

  • Escalate to Domain Admin level access. 
  • Inherit privileged group memberships and SPNs
  • Steal Kerberos keys from target users, especially if RC4 encryption is enabled. 

By integrating this scenario into the Cymulate platform, organizations can simulate the exact kill chain, identify weak points and act before attackers do

Test Your Defenses Now 

Want to know if your environment is vulnerable to BadSuccessor? Simulate the threat safely with Cymulate’s BadSuccessor Breach Simulation Scenario - now available on our platform

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo