Resources

Flipping the Script on Exposure Management: Seeing Risk the Way Attackers Do
Erez Hasson | October 27, 2025

As someone coming from an application security background, stepping into the world of Exposure Management has been both exciting and a bit overwhelming. Since…

Windows Server Update Service (WSUS) Critical Vulnerability: CVE-2025-59287 Under Active Exploitation
Peled Eldan & Erez Hasson | October 26, 2025

Overview Microsoft has disclosed a critical remote code execution (RCE) vulnerability in Windows Server Update Service (WSUS), tracked as CVE-2025-59287. Initial warnings indicated a…

XM Cyber Helps Jerusalem Municipality Strengthen Security and Gain Visibility

When Yonatan Grunwald joined the Jerusalem Municipality as an information security expert, his first priority was clear. He needed to build a security program…

XM Cyber Helps Lidl Spain Focus on What Matters Most

For Josep Mulero, Information Security Officer at Lidl Spain, the challenge was clear: traditional tools generated a flood of data, but not the clarity…

XM Cyber Helps Golf Club St. Leon-Rot Gain Visibility and Strengthen IT Security

Golf Club St. Leon-Rot is one of the most well-known golf clubs in Germany. For Johannes Hofmann, the club’s IT Manager, managing IT security…

Cracking the Boardroom Code: A New Path for CISOs 
Batya Steinherz | October 12, 2025

CISOs dedicate entire careers to mastering security. With a skill set expertly tuned to spotting threats, building defenses, and maintaining compliance, the goal is…

CRITICAL ALERT: Oracle E-Business Suite Zero-Day Vulnerability, CVE-2025-61882, Under Active Exploitation!
Peled Eldan & Erez Hasson | October 09, 2025

Overview Oracle has just disclosed that a critical zero-day vulnerability, tracked as CVE-2025-61882, has been identified in Oracle E-Business Suite (EBS) and is currently…

Can CTEM Address the Hidden Gaps in Your PAM Program?
Craig Boyle & Yaron Mazor | September 21, 2025

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of a zero-trust model, designed…

Stop Wasting Time on Endless Exposures. Fix What Matters.

Tired of endless lists of exposures that don’t show what really matters? As attack surfaces grow, the volume of exposures grows too- from CVEs…

Zero Trust & Exposure Management: Your Path to Proactive Security

Join our live AMA to learn how the two work together to build a resilient security posture.

Case Study: Yaron King, Senior Cybersecurity Specialist

Hear from Yaron King, a Senior Cybersecurity Specialist at a government institution, as he shares why his team chose the XM Cyber platform. Yaron…

How Equiniti Reduced Risk and Streamlined Security with XM Cyber

Equiniti provides financial administration services for large corporations, including pensions, shareholder management, and payments. The company handles sensitive financial and personal data, and security…

1 2 3 4 45

See what attackers see, so you can stop them from doing what attackers do.