Blog

CRITICAL ALERT: React2Shell CVE-2025-55182 is Under Active Exploitation!
Peled Eldan & Erez Hasson | December 06, 2025

Overview On December 3, 2025, the security community was alerted to a critical vulnerability in the React Server Components (RSC) ecosystem, now widely referred…

Patching Can’t Save You: How Agentic AI Broke Vulnerability Management
Erez Hasson | November 25, 2025

There probably isn’t anything to be said about AI that hasn’t been said. One thing is certain, though: if the cyber threat landscape wasn’t…

How to Accelerate Zero Trust with Exposure Management
Alex Welin | November 23, 2025

I recently delivered a webinar on Zero Trust and how to make that journey more efficient with Exposure Management. I expected a typical session,…

Challenge Accepted!
XM Cyber Named a Challenger in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms
Maya Malevich | November 13, 2025

The word is out! We are thrilled to announce that XM Cyber has been named a Challenger in the 2025 Gartner® Magic Quadrant™ for…

How to Build a Continuous Exposure Management Plan from Scratch
Jason Fruge | November 10, 2025

Most security leaders I’ve worked with completely get the theory of exposure management. The challenge lies in turning that theory into practice. Many EM…

From Alerts to Action: Streamlining Remediation Operations with Continuous Exposure Management
Ryan Blanchard | October 30, 2025

Security teams face an unprecedented challenge; Attackers are moving faster than ever before, and the proliferation of openly-available AI-powered attack tools have democratized advanced…

Flipping the Script: Seeing Risk the Way Attackers Do
Erez Hasson | October 27, 2025

As someone coming from an application security background, stepping into the world of Exposure Management has been both exciting and a bit overwhelming. Since…

Windows Server Update Service (WSUS) Critical Vulnerability: CVE-2025-59287 Under Active Exploitation
Peled Eldan & Erez Hasson | October 26, 2025

Overview Microsoft has disclosed a critical remote code execution (RCE) vulnerability in Windows Server Update Service (WSUS), tracked as CVE-2025-59287. Initial warnings indicated a…

Cracking the Boardroom Code: A New Path for CISOs 
Batya Steinherz | October 12, 2025

CISOs dedicate entire careers to mastering security. With a skill set expertly tuned to spotting threats, building defenses, and maintaining compliance, the goal is…

CRITICAL ALERT: Oracle E-Business Suite Zero-Day Vulnerability, CVE-2025-61882, Under Active Exploitation!
Peled Eldan & Erez Hasson | October 09, 2025

Overview Oracle has just disclosed that a critical zero-day vulnerability, tracked as CVE-2025-61882, has been identified in Oracle E-Business Suite (EBS) and is currently…

Can CTEM Address the Hidden Gaps in Your PAM Program?
Craig Boyle & Yaron Mazor | September 21, 2025

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of a zero-trust model, designed…

Your Supply Chain Is an Attack Surface – Here’s How to Secure It
Jason Fruge | September 07, 2025

Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive systems – many of…

1 2 3 29

See what attackers see, so you can stop them from doing what attackers do.