Frequently Asked Questions

Exposure Management & Security Validation

What is exposure validation and why is it important for cybersecurity?

Exposure validation is the process of continuously and automatically testing your security controls against the latest adversarial techniques to ensure they are effectively stopping real-world attacks. Cymulate's approach provides operational metrics, evidence-based insights, and board-ready reports, helping organizations identify gaps and improve resilience. This proactive validation is crucial because attackers often exploit known vulnerabilities and misconfigurations, not just new threats.

What are the key findings from Cymulate's 2024 State of Exposure Management & Security Validation report?

The 2024 report highlights that attackers continue to exploit older, known vulnerabilities like Log4Shell (CVE-2021-44228), with 75% of web application firewalls able to block exploits, but endpoint and web gateway protection effectiveness ranging from 62% to 89%. The Pikabot malware was the most frequently assessed threat, with only 47% average control effectiveness. Additionally, 63% of organizations had at least one publicly exposed management service, and there was a 5% decrease in overall control effectiveness, underscoring the need for continuous validation.

How does Cymulate help organizations address vulnerabilities like Log4Shell?

Cymulate enables organizations to simulate attacks targeting vulnerabilities such as Log4Shell, assess the effectiveness of their security controls, and identify where coverage gaps exist. The platform provides actionable insights and recommendations for mitigation, allowing organizations to proactively strengthen defenses before attackers can exploit these weaknesses.

What is the significance of publicly exposed management services in the attack surface?

Publicly exposed management services, such as email and database services, create initial access points for malicious actors and significantly expand the attack surface. According to Cymulate's research, 63% of organizations had at least one instance of publicly exposed management services, 47% had exposed email services, and 10% had exposed database services, highlighting the importance of continuous exposure management.

How effective are security controls against threats like Pikabot according to Cymulate's research?

Cymulate's 2024 research found that, on average, security controls were only 47% effective against the Pikabot malware family, meaning 53% of assessments were able to penetrate defenses. This demonstrates the need for ongoing validation and improvement of security controls to address evolving threats.

What are the most common weaknesses identified in Cymulate's exposure assessments?

The most common weaknesses include exploitation of older vulnerabilities (such as Log4Shell), misconfigurations leading to weakened encryption (e.g., vulnerable cipher suites for HTTPS), and publicly exposed management services. Over 30% of Cymulate scans identified vulnerable cipher suites, emphasizing the need for strong security fundamentals.

How does Cymulate correlate weaknesses, threats, and controls in its research?

Cymulate's research aggregates data from attack surface assessments, simulated attack scenarios, and automated red teaming to correlate exposures (vulnerabilities, misconfigurations), threat activity, and the effectiveness of security controls. This approach provides a comprehensive view of where gaps exist and how to prioritize remediation efforts.

Why is continuous security validation necessary according to Cymulate's findings?

Continuous security validation is necessary because attackers frequently exploit known vulnerabilities and misconfigurations, and the effectiveness of security controls can decrease over time. Cymulate's findings show a 5% decrease in control effectiveness, highlighting the importance of ongoing validation to identify and address coverage gaps before attackers can exploit them.

How does Cymulate's platform help organizations move from reactive to proactive security?

Cymulate's platform enables organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture through continuous discovery, validation, prioritization, and guided remediation. This approach helps organizations address security gaps before attackers can exploit them, rather than reacting after an incident occurs.

Where can I access the full 2024 State of Exposure Management & Security Validation report?

You can access the full report on the Cymulate website at this link.

Features & Capabilities

What features does Cymulate offer for exposure management?

Cymulate offers a unified platform that includes Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), Exposure Analytics, Attack Path Discovery, Automated Mitigation, and AI-powered optimization. The platform provides continuous threat validation, attack path discovery, automated mitigation, and an extensive threat library with over 100,000 attack actions updated daily.

How does Cymulate automate offensive security testing?

Cymulate automates advanced offensive security testing by simulating real-world attack scenarios and campaigns, validating controls, threats, and attack paths. This automation allows organizations to continuously assess their security posture without relying solely on manual penetration testing.

What is Cymulate's approach to integrating with existing security and IT infrastructure?

Cymulate is an open platform that integrates with a wide range of security technologies and IT infrastructure, enabling organizations to leverage their existing tools while enhancing exposure management workflows. For a full list of integrations, visit Cymulate's Partnerships and Integrations page.

How does Cymulate support continuous discovery and prioritization of security weaknesses?

Cymulate continuously discovers, validates, and prioritizes security weaknesses by correlating exposures, threats, and control effectiveness. The platform provides guided remediation and actionable insights, helping organizations focus on the most critical vulnerabilities and exposures.

What is the role of AI in Cymulate's platform?

Cymulate leverages AI and machine learning to deliver actionable insights, prioritize remediation efforts, and optimize security controls. This helps organizations efficiently address high-risk vulnerabilities and improve their overall security posture.

How often is Cymulate's threat library updated?

Cymulate's threat library is updated daily, ensuring that organizations can test their defenses against the latest adversarial techniques and emerging threats.

What metrics does Cymulate provide to measure security effectiveness?

Cymulate provides operational metrics such as control effectiveness scores, exposure rates, and benchmarking against industry peers. These metrics help organizations track improvements, demonstrate resilience to leadership, and justify security investments.

How does Cymulate help with remediation after identifying security gaps?

Cymulate provides guided remediation steps and integrates with security controls to push updates for immediate threat prevention. The platform also offers actionable recommendations tailored to the organization's environment and risk profile.

What types of attack scenarios can Cymulate simulate?

Cymulate can simulate a wide range of attack scenarios, including exploitation of known vulnerabilities (e.g., Log4Shell), malware campaigns (e.g., Pikabot), lateral movement, privilege escalation, and more. The platform covers the full attack lifecycle, enabling comprehensive security validation.

Use Cases & Benefits

Who can benefit from using Cymulate's exposure management platform?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. The platform delivers measurable improvements in threat resilience, operational efficiency, and alignment of security strategies with business goals.

What are some real-world results achieved by Cymulate customers?

Customers have reported significant outcomes, such as Hertz Israel reducing cyber risk by 81% in four months, a sustainable energy company scaling penetration testing cost-effectively, and a credit union optimizing SecOps with live-data exercises. For more case studies, visit Cymulate's Case Studies page.

How does Cymulate address the needs of different security personas?

Cymulate tailors its solutions to different roles: CISOs receive quantifiable metrics for investment justification, SecOps teams benefit from automation and efficiency, red teams gain access to advanced offensive testing, and vulnerability management teams can prioritize and validate exposures effectively. Each persona receives targeted tools and insights to address their unique challenges.

What pain points does Cymulate solve for organizations?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. The platform provides a unified, automated, and actionable approach to exposure management.

How does Cymulate help organizations stay ahead of emerging threats?

Cymulate continuously updates its threat library, simulates the latest attack techniques, and validates defenses in real-time. This proactive approach ensures organizations can identify and address new risks before attackers exploit them.

What are the operational efficiency benefits of using Cymulate?

Cymulate automates security validation processes, leading to a 60% increase in team efficiency and saving up to 60 hours per month in testing new threats. The platform also consolidates multiple tools, reducing costs and minimizing the risk of costly breaches.

How does Cymulate support compliance and regulatory requirements?

Cymulate helps organizations meet compliance and regulatory requirements by providing continuous validation, evidence-based reporting, and alignment with frameworks such as MITRE ATT&CK. The platform's certifications (SOC2 Type II, ISO 27001, CSA STAR Level 1) further support compliance efforts.

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to help organizations proactively validate their cybersecurity defenses, identify vulnerabilities, and optimize their security posture. This empowers security teams to stay ahead of emerging threats and improve overall resilience.

How does Cymulate foster collaboration across security teams?

Cymulate provides a unified view of exposure risks and enables collaboration between SecOps, red teams, and vulnerability management teams. This integrated approach ensures a coordinated response to security challenges and supports a successful Continuous Threat Exposure Management (CTEM) program.

Security, Compliance & Implementation

What security and compliance certifications does Cymulate hold?

Cymulate holds several key certifications, including SOC2 Type II (covering security, availability, confidentiality, and privacy), ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security Controls), and CSA STAR Level 1 (Cloud Controls Matrix). These certifications demonstrate Cymulate's commitment to industry-leading security and compliance standards. Learn more.

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, and a tested disaster recovery plan. The platform is developed using a secure development lifecycle (SDLC), with continuous vulnerability scanning and annual third-party penetration tests. Cymulate is also GDPR compliant and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO).

What product security features does Cymulate provide?

Cymulate's platform includes mandatory two-factor authentication (2FA), role-based access controls (RBAC), IP address restrictions, and TLS encryption for its Help Center. These features help ensure only authorized users can access sensitive information and platform capabilities.

How easy is it to implement Cymulate and start using it?

Cymulate is designed for quick and easy implementation. It operates in agentless mode, requiring no additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment, with comprehensive support and educational resources available to assist with onboarding and optimization.

What support options are available for Cymulate customers?

Cymulate offers email support ([email protected]), real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for querying the knowledge base and creating AI templates. These resources ensure customers can maximize the platform's effectiveness with minimal effort.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and ease of use. Testimonials highlight the platform's simplicity, actionable insights, and accessible support, making it effective for users of all skill levels. For example, Raphael Ferreira, Cybersecurity Manager, stated, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture."

How does Cymulate ensure ongoing innovation and platform updates?

Cymulate updates its SaaS platform every two weeks with new features, such as AI-powered SIEM rule mapping and advanced exposure prioritization. This commitment to continuous innovation ensures customers always have access to the latest capabilities and threat intelligence.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing is determined by the chosen package, number of assets, and scenarios selected for testing and validation. For a detailed quote, organizations can schedule a demo with the Cymulate team.

Company Information & Recognition

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by providing tools for continuous threat validation and exposure management. The vision is to create a collaborative environment where organizations can achieve lasting improvements in their cybersecurity strategies. Learn more.

Where can I find Cymulate's latest news, press releases, and media coverage?

You can find all of Cymulate's latest company announcements, press releases, and media coverage in the Cymulate newsroom. This includes information on partnerships, product updates, industry awards, and expert research featured in leading publications.

Has Cymulate received any industry recognition or awards?

Yes, Cymulate has been named a Market Leader for Automated Security Validation by Frost & Sullivan and recognized as a Customers' Choice in the 2025 Gartner Peer Insights. For more details, see the press release.

Where can I find Cymulate's customer reviews and case studies?

You can read customer reviews on the Cymulate Reviews page and explore industry-specific case studies on the Cymulate Case Studies page.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Cymulate Research Highlights Exposure Validation with Correlation of Weaknesses, Threats & Controls

March 6, 2024

NEW YORK and TEL AVIV – March 6, 2024 – Cymulate, the leader in security and exposure validation, today published its 2024 State of Exposure Management & Security Validation research report. The report, which aggregates anonymized data from attack surface assessments, simulated attack scenarios and campaigns, and automated red teaming activities across more than 500 Cymulate customers, highlights the proactive approach that takes an attacker’s view to identify and address security gaps before attackers find and exploit them.

The Cymulate research highlights the correlation of threat exposures from vulnerabilities, misconfigurations and other weaknesses with both threat activity and the security controls designed to mitigate the threats. In this correlated analysis of exposures, threats and controls, the Cymulate research noted that the infamous Log4Shell vulnerability (CVE: 2021-44228) from late 2021 remains one of the most frequently targeted vulnerabilities. Threat actors, such as Lazarus, MuddyWater and groups associated with North Korea and Iran, targeted the vulnerability in their 2023 campaigns. On average, 75% of web application firewalls demonstrated their ability to block exploits of the Log4Shell vulnerability, while endpoint security and web gateway protection showed security effectiveness from 62% to 89% to protect against post-exploit threat activity in these campaigns.

The Cymulate report identified the Pikabot malware family as the most frequently assessed threat among Cymulate customers. Pikabot emerged in 2023 as a malicious backdoor exploit associated with ransomware distribution, crypto mining, data theft and remote control. In their validation of the threat, Cymulate research shows that, on average, security controls were only 47% effective, which means 53% of the Pikabot assessments were able to penetrate defenses.

Among the report’s other key findings was the exposure risk created by 63% of organizations reporting at least one instance of publicly exposed management services. A security weakness not associated with vulnerabilities, these publicly exposed management services greatly expand the attack surface by creating initial access points to malicious actors. The Cymulate research noted 47% of organizations have at least one instance of publicly exposed email services and 10% exposed database services publicly.

The Cymulate research showed an overall 5% decrease in control effectiveness based on the average Cymulate score of controls and vectors. While a decrease in effectiveness is obviously concerning, it also underscores the importance of security validation practices, which can allow organizations to identify where coverage gaps exist and implement mitigation tactics or compensating controls.

“This new research underscores the critical insights that exposure management and security validation solutions can provide for today’s businesses,” said Avihai Ben Yossef, Cymulate co-founder and CTO. “As new attack tactics emerge and adversaries continue to make use of existing vulnerabilities, businesses cannot afford to be reactive. They need to proactively gauge the effectiveness of their security solutions, identify where gaps exist and take the necessary action to limit their risk and mitigate their exposure. We are encouraged to see a growing number of organizations adopting the exposure management and security validation tools needed to improve their security posture.”

One of the report’s most consistent themes was the continued exploitation of older, known vulnerabilities rather than new or innovative techniques. Misconfigurations leading to weakened encryption and increased susceptibility to attack remain common—particularly within older web applications using legacy code that cannot be updated. More than 30% of Cymulate scans identified vulnerable cipher suites for HTTPS, which remains an actively exploited area of an older flaw. These findings serve as an important reminder that today’s organizations must ensure they have strong security fundamentals in addition to preparing for new and emerging threats.

The full 2024 State of Exposure Management & Security Validation report is available on the Cymulate website. To learn more about Cymulate security and exposure validation solutions and whether they may be right for your organization, click here.

About Cymulate   

Cymulate, the leader in security and exposure validation, provides the single source of truth for threat exposure and the actions required to close security gaps before attackers can exploit them. More than 500 customers worldwide rely on the Cymulate platform to baseline their security posture and strengthen cyber resilience with continuous discovery, validation, prioritization, and guided remediation of security weaknesses. Cymulate automates advanced offensive security testing to validate controls, threats, and attack paths. As an open platform, Cymulate integrates with existing security and IT infrastructure and drives the workflows of the exposure management process. For more information, visit www.cymulate.com.

Media Contact:
Melissa Mazurek
Account Manager
[email protected]

 

Get the Report