Resources

XM Cyber Helps Global Retail Giant Secure Rapidly Expanding Infrastructure

As a global luxury goods manufacturer, security was a top priority. But their rapid global growth, fueled by frequent acquisitions,…
Case Studies

Announcing Enhanced EASM Capabilities for Validating End-to-End Risk

Last year, we introduced External Attack Surface Management (EASM) into the XM Continuous Exposure Management (CEM) platform. We knew then…
Blog

JUMPSHOT: XM Cyber Uncovers Critical Local Privilege Escalation (CVE-2025-34352) in JumpCloud Agent

XM Cyber Researcher Hillel Pinto uncovered CVE-2025-34352, a critical vulnerability in the JumpCloud Remote Assist for Windows agent (versions prior…
Blog

XM Cyber and Bizerba
How a Global Leader Protects its Legacy with Continuous Security

Bizerba, a fifth-generation global leader in weighing technology, uses XM Cyber on STACKIT to secure its digital transformation, protect decades…
Case Studies

CRITICAL ALERT: React2Shell CVE-2025-55182 is Under Active Exploitation!

Overview On December 3, 2025, the security community was alerted to a critical vulnerability in the React Server Components (RSC)…
Blog

Continuous Visibility:
How XM Cyber Protects Patient Trust Across Sana Kliniken’s Network

Sana Kliniken AG is one of Germany’s largest healthcare providers, operating a vast network that includes about 50 clinics, 58…
Case Studies

Patching Can’t Save You: How Agentic AI Broke Vulnerability Management

There probably isn’t anything to be said about AI that hasn’t been said. One thing is certain, though: if the…
Blog

Cutting Through the Noise: A Reality Check on Exposure Management

Join us as we break down the key capabilities of exposure management solutions and clarify how they differ in approach,…
Webinars

How to Accelerate Zero Trust with Exposure Management

I recently delivered a webinar on Zero Trust and how to make that journey more efficient with Exposure Management. I…
Blog

Navigating the Exposure Management Space: A Buyer’s Guide

Behind every successful breach is a chain of interconnected failures—a stolen password, a missing patch, over-permissions, a misconfigured S3 bucket.…
eBooks & Whitepapers

XM Cyber and Kärcher
Protecting a Global Innovator With Continuous Visibility

This trend led Kärcher CEO Hartmut Jenner to place a special focus on cyber security. According to Jenner, “Through our…
Case Studies

XM Cyber and FC Bayern Munich
Protecting Fans Through Digital Sovereignty

FC Bayern Munich’s comprehensive approach to cybersecurity also reflects a broader institutional commitment to control and independence. Running XM Cyber…
Case Studies
1 2 3 4 46

Request a demo

See what attackers see, so you can stop them from doing what attackers do.