Blog

Flipping the Script: Seeing Risk the Way Attackers Do

As someone coming from an application security background, stepping into the world of Exposure Management has been both exciting and…
Blog

Windows Server Update Service (WSUS) Critical Vulnerability: CVE-2025-59287 Under Active Exploitation

Overview Microsoft has disclosed a critical remote code execution (RCE) vulnerability in Windows Server Update Service (WSUS), tracked as CVE-2025-59287.…
Blog

Cracking the Boardroom Code: A New Path for CISOs 

CISOs dedicate entire careers to mastering security. With a skill set expertly tuned to spotting threats, building defenses, and maintaining…
Blog

CRITICAL ALERT: Oracle E-Business Suite Zero-Day Vulnerability, CVE-2025-61882, Under Active Exploitation!

Overview Oracle has just disclosed that a critical zero-day vulnerability, tracked as CVE-2025-61882, has been identified in Oracle E-Business Suite…
Blog

Can CTEM Address the Hidden Gaps in Your PAM Program?

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of…
Blog

Your Supply Chain Is an Attack Surface – Here’s How to Secure It

Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive…
Blog

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own…
Blog

XM Cyber and Google SecOps: Turning Context into Action

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert…
Blog

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability…
Blog

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog
1 2 3 4 5 30

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.