Resources

XM Cyber Helps Vinci Construction Fortify Global Security Posture and Dramatically Reduce Risk

Vinci Construction manages high-stakes infrastructure projects worldwide, including work on the Paris Metro, major highways, and airports. Operating in over…
Case Studies

XM Cyber Helps Leading Financial Services Provider Gain Real-Time Exposure Visibility

A leading financial market infrastructure provider, responsible for completing trades, safeguarding assets, and other essential financial services across global capital…
Case Studies

XM Cyber Helps Global Retail Giant Secure Rapidly Expanding Infrastructure

As a global luxury goods manufacturer, security was a top priority. But their rapid global growth, fueled by frequent acquisitions,…
Case Studies

Announcing Enhanced EASM Capabilities for Validating End-to-End Risk

Last year, we introduced External Attack Surface Management (EASM) into the XM Continuous Exposure Management (CEM) platform. We knew then…
Blog

JUMPSHOT: XM Cyber Uncovers Critical Local Privilege Escalation (CVE-2025-34352) in JumpCloud Agent

XM Cyber Researcher Hillel Pinto uncovered CVE-2025-34352, a critical vulnerability in the JumpCloud Remote Assist for Windows agent (versions prior…
Blog

XM Cyber and Bizerba
How a Global Leader Protects its Legacy with Continuous Security

Bizerba, a fifth-generation global leader in weighing technology, uses XM Cyber on STACKIT to secure its digital transformation, protect decades…
Case Studies

CRITICAL ALERT: React2Shell CVE-2025-55182 is Under Active Exploitation!

Overview On December 3, 2025, the security community was alerted to a critical vulnerability in the React Server Components (RSC)…
Blog

Continuous Visibility:
How XM Cyber Protects Patient Trust Across Sana Kliniken’s Network

Sana Kliniken AG is one of Germany’s largest healthcare providers, operating a vast network that includes about 50 clinics, 58…
Case Studies

Patching Can’t Save You: How Agentic AI Broke Vulnerability Management

There probably isn’t anything to be said about AI that hasn’t been said. One thing is certain, though: if the…
Blog

Cutting Through the Noise: A Reality Check on Exposure Management

Join us as we break down the key capabilities of exposure management solutions and clarify how they differ in approach,…
Webinars

How to Accelerate Zero Trust with Exposure Management

I recently delivered a webinar on Zero Trust and how to make that journey more efficient with Exposure Management. I…
Blog

Navigating the Exposure Management Space: A Buyer’s Guide

Behind every successful breach is a chain of interconnected failures—a stolen password, a missing patch, over-permissions, a misconfigured S3 bucket.…
eBooks & Whitepapers
1 2 3 4 46

Request a demo

See what attackers see, so you can stop them from doing what attackers do.