Products

What’s New in CyCognito: August 2025 Platform Enhancements

Igal-Zeifman
By Igal Zeifman
VP of Marketing
August 21, 2025

Security teams need automation, clarity, and speed to stay ahead. This month’s updates continue to refine the CyCognito experience so you can maintain an accurate asset inventory, pivot through investigations quickly, and share the right information with stakeholders.

In the past few weeks we delivered improvements across automation (including Action Rules), APIs improvements, new investigation and management options, and reporting controls for PDFs. Below is a detailed look at what is new.

Action Rules: Automate Asset Management 

Action Rules now streamline routine asset hygiene by executing actions automatically when your conditions are met. Using Action Rules you can create custom policies that will save you time by automatically managing attribution, applying or removing tags, remove assets when predefined filters conditions and more. 

The result is an inventory that stays organized and aligned to policy with less manual effort, so your team can focus on higher-value work.

Enhanced API Capabilities

We have extended API coverage for the unified Asset List so you can query and retrieve all asset types through a single endpoint. This makes it possible to run CyQL queries across multiple asset classes and receive consolidated results in one call, simplifying orchestration in scripts and pipelines.

In addition, we also added a new endpoint that enables removal of multiple assets in one operation. Submit a bulk request with asset identifiers to accelerate inclusion and exclusion workflows during cleanups, audits, or M&A transitions. Large-scale actions become repeatable and fast.

Visit our API documentation to learn more

New Investigation and Management Options

Cloud Environment Provider Filter

We have introduced a new filtering capability that allows users to filter assets by their cloud environment provider. 

The filter is available as CLOUD PROVIDER in the basic filters and as cloud_env_provider in CyQL, making it easier to manage and monitor cloud infrastructure assets. This equips users with more precise control and improves the overall cloud asset management experience.

Issue Confidence Level Enums

The Confidence level is a unique metric in our platform that measures the likelihood an issue is both real and exploitable, helping reduce false positives with over 90% accuracy. To make it even more actionable, the latest update introduces standardized enums aligned with numeric ranges:

  • Confirmed (100)
  • Likely (81–99)
  • Potential (51–80)
  • Inconclusive (30–50)

This makes triage faster and more intuitive. Confidence values now appear consistently across the platform, including issue lists and details, filters, advanced search, the API, CSV exports, and PDF reports, so prioritization stays aligned regardless of where you work.

Issue Catalog Asset Navigation

We have added clickable ‘Affected assets’ counts in the Issue Catalog that take you directly to the Issue List with the corresponding filter already applied. This lets you move from a high-level issue view to detailed analysis in a single step (less time recreating searches, more time resolving issues).

Customizable Reporting

Configurable Discovery Path in PDF Reports

You can configure exported PDF reports (issues and assets) to exclude the discovery path section when it is not relevant for the recipients. This is especially useful for organizations managing multiple unrelated entities.

Attribution Propagation Paths in PDF Reports

Exported PDF reports can now include attribution propagation paths for assets and issues, providing a clear view of how assets are attributed to your organizations.

CyCognito customers: To enable these reporting options for your organization, please contact [email protected].

Do More with CyCognito

These updates are built to reduce manual effort and improve decision speed in exposure management (with ASM as a core pillar). They help you maintain a clean asset inventory, move through investigations efficiently, and present the right context to stakeholders without extra work.

Ready to see it in action? Log in and explore the new capabilities today or contact us for a demo if you’re evaluating CyCognito as part of your exposure management journey.




About the Author

Igal-Zeifman

Igal Zeifman

VP of Marketing

Igal Zeifman has worked in cybersecurity and cloud for over two decades, leading strategic, full-funnel marketing efforts at both startups and global enterprises. He has held senior marketing roles at several application and endpoint security companies, contributing at pivotal stages of growth as well as to security research and product initiatives that shaped market perception and adoption.

Topics



Search the Blog



Featured Posts








Top Tags



Stay informed

Subscribe to the Blog

Subscribe now to get the latest insights delivered straight to your inbox.

CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.

Related Guides

Discover insights on application security, exposure management and other key topics below.

Learning Center Attack Surface
Understanding Attack Surface Management

The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.

Learning Center Exposure Management
Exposure Management in Cybersecurity: Concepts and Technologies

Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.

Learning Center Vulnerability Assessment
Vulnerability Assessment: Process, Challenges & Best Practices

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

Related Products

Explore CyCognito modules ASM, AST and EI in the resources below.

Platform > Products
Attack Surface Management

Scalable, continuous, and comprehensive testing for all external assets, all the time.

Platform > Products
Automated Security Testing

CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.

Platform > Products
Exploit Intelligence

CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.