Frequently Asked Questions

Ransomware Attacks & Incident Response

What happened during the Ryuk ransomware attack in New Orleans?

On December 16, 2019, New Orleans declared a state of emergency after detecting a Ryuk ransomware attack. Officials took systems offline following suspicious activity, including phishing attempts, to prevent further damage and began recovery efforts. Read more.

How did New Orleans respond to the ransomware attack?

City officials began taking systems offline after noticing suspicious activity, including phishing attempts, at 5 a.m. Recovery efforts involved multiple agencies and departments, with ongoing impact on city operations. See official update.

What are the risks associated with ransomware attacks like Ryuk?

Ransomware attacks can disrupt business operations, encrypt critical data, cause financial loss, and damage reputation. In the case of New Orleans, the attack led to a state of emergency and required extensive recovery efforts.

How can organizations protect themselves from ransomware?

Organizations can protect themselves by validating their security controls, simulating real-world attacks, and prioritizing remediation efforts. Cymulate offers continuous threat validation and exposure management to help organizations stay ahead of ransomware threats. Read our blog post on ransomware protection.

What resources does Cymulate offer regarding ransomware in healthcare?

Cymulate provides a blog post explaining why proactive cybersecurity strategies are essential for healthcare organizations to protect against ransomware. Read more.

What was the potential impact of the email gateway flaw discovered by Cymulate?

The email gateway flaw allowed ransomware to bypass controls, exposing the organization to widespread infections, business disruption, data loss, reputational damage, and financial/legal consequences. See customer stories.

What was the potential impact of the web gateway misconfiguration described in the customer story?

Employees could download malware, ransomware, or trojans directly from the internet, exposing the organization to ransomware attacks, phishing campaigns, and data breaches. Read more.

What was the potential impact of an attacker gaining access to 11 domain admin machines in the shipping company's network?

An attacker could deploy ransomware across the network, modify Active Directory policies, create backdoors, and disable security tools such as SIEM, EDR, and firewalls. See case studies.

What was the security exposure a large retail company faced after a cyberattack?

The retail company experienced a server outage and financial loss. The security team identified inadequate Web Application Firewall (WAF) defenses, leaving the server vulnerable to further attacks. Read more.

Features & Capabilities

What features does Cymulate offer for threat validation?

Cymulate provides continuous threat validation, simulating real-world attacks to test and validate defenses across IT environments. It includes attack path discovery, automated mitigation, detection engineering, and complete kill chain coverage. Learn more.

Does Cymulate support automated mitigation?

Yes, Cymulate integrates with security controls to push threat updates for immediate prevention of missed threats. Learn about Automated Mitigation.

How does Cymulate accelerate detection engineering?

Cymulate validates responses and builds custom detection rules for SIEM, EDR, and XDR, helping organizations improve their mean time to detect threats. See how we help accelerate detection engineering.

What is Cymulate's threat library?

Cymulate provides an advanced library of attack simulations with daily updates, keeping customers ahead of emerging threats. Learn more.

What integrations does Cymulate support?

Cymulate integrates with a wide range of technology partners, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Cybereason, and more. For a complete list, visit our Partnerships and Integrations page.

How often is Cymulate's SaaS platform updated?

Cymulate updates its SaaS platform every two weeks with new features, including AI-powered SIEM rule mapping and advanced exposure prioritization. Learn more.

How easy is Cymulate to use?

Customers consistently praise Cymulate for its user-friendly and intuitive platform. It is easy to implement and use, requiring minimal resources. As Raphael Ferreira, Cybersecurity Manager at Banco PAN, stated: "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Read customer testimonials.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. The subscription fee is non-refundable and must be paid regardless of actual use. For a detailed quote, schedule a demo.

Competition & Comparison

Who are Cymulate's main competitors?

Cymulate's main competitors include AttackIQ, Mandiant Security Validation, Pentera, Picus Security, SafeBreach, and Scythe. See competitor comparisons.

How does Cymulate compare to AttackIQ?

AttackIQ delivers automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Cymulate offers the industry's leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. Read more.

How does Cymulate compare to Mandiant Security Validation?

Mandiant is one of the original BAS platforms but has become outdated with little innovation in the past 5 years. Cymulate continually innovates with AI and automation, expanding into the exposure management market as a grid leader. Read more.

How does Cymulate compare to Pentera?

Pentera focuses on attack path validation but lacks the depth Cymulate provides to fully assess and strengthen defenses. Cymulate offers comprehensive exposure validation, covering the full kill chain and providing cloud control validation. Read more.

Use Cases & Benefits

Who can benefit from Cymulate?

Cymulate is designed for CISOs, Security Leaders, SecOps teams, Red Teams, and Vulnerability Management teams across industries such as finance, healthcare, retail, media, transportation, and manufacturing. Learn more.

What business impact can customers expect from using Cymulate?

Customers report an 81% reduction in cyber risk within four months, a 60% increase in efficiency, 40X faster threat validation, 30% improvement in threat prevention, and a 52% reduction in critical exposures. Read the Hertz Israel case study.

What pain points does Cymulate solve?

Cymulate addresses overwhelming threat volume, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers. It provides continuous threat validation, prioritization, improved resilience, collaboration, automation, and validated exposure scoring. Learn more.

Do the pain points solved by Cymulate differ by persona?

Yes. CISOs benefit from clear metrics and communication tools; SecOps teams gain operational efficiency and visibility; Red Teams access automated offensive testing; Vulnerability Management teams receive prioritized exposure insights. Learn more.

What were the primary security challenges faced by Nemours?

Nemours needed to evaluate defenses against the latest threats, prioritize remediation, and improve incident response skills. Cymulate helped reduce alert fatigue and provided visibility to prioritize patching and optimize controls. Read the Nemours case study.

Technical Requirements & Implementation

How long does it take to implement Cymulate?

Cymulate is designed for quick implementation. It operates in agentless mode, requiring no additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. Book a demo.

What support resources does Cymulate provide?

Cymulate offers email support, real-time chat support, a knowledge base, webinars, e-books, and an AI chatbot for technical queries and best practices. Contact support or join a webinar.

Security & Compliance

What security and compliance certifications does Cymulate have?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, ensuring robust security and compliance. Learn more.

How does Cymulate ensure data security and privacy?

Cymulate is hosted in secure AWS data centers, uses TLS 1.2+ for data in transit, AES-256 for data at rest, and follows a strict Secure Development Lifecycle. It employs a dedicated privacy and security team, including a Data Protection Officer and CISO. Learn more.

News & Resources

Where can I find Cymulate's newsroom and media mentions?

You can access the latest company announcements, press releases, and media coverage in leading publications in our newsroom.

Where can I find news, events, and blog posts from Cymulate?

Stay up-to-date with Cymulate through our blog, newsroom, and events & webinars pages. Read our blog, visit our newsroom, or join an event.

How can I stay informed about Cymulate's news, events, and webinars?

You can stay up-to-date with Cymulate through our newsroom for media mentions, and our events & webinars page for live and digital events. Newsroom | Events & Webinars

Where can I find the latest news and press releases about Cymulate?

You can find the latest news, press releases, and media coverage on Cymulate's News Room page. Recent highlights include partnerships, industry recognition, and technology integrations. Visit our news page.

Where can I find the Cymulate blog and newsroom?

For insights on threats and company news, visit our blog and our newsroom.

npm Under Siege: Worms, Toolchains and the Next Evolution of Supply Chain Attacks

Watch the video npm Under Siege: Worms, Toolchains and the Next Evolution of Supply Chain Attacks video for insights into supply chain threats and mitigation strategies.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

New Orleans Hamstrung by Ransomware Attack

December 16, 2019

The mayor of New Orleans Friday declared a state of emergency after the city detected what is now believed to be a Ryuk ransomware attack. Mayor LaToya Cantrell said the attack closely resembles previous attacks on the state of Louisiana less than a month ago. Louisiana activated its cybersecurity team in mid-November after the state was targeted in an attempted ransomware attack similar to those aimed at government organizations and local school districts during the summer, the newly re-elected Governor John Bel Edwards tweeted at the time. In this latest incident, New Orleans officials began taking systems offline after noticing suspicious activity, including phishing attempts, last Friday at 5 a.m. “The city remains actively involved in recovery efforts related to the cybersecurity incident last Friday and individual agencies and departments will be impacted in various ways,” Cantrell tweeted Sunday evening. Read the full story and Cymulate’s take on the ransomware attack here:
READ MORE