Webinar: ✨ How Colgate-Palmolive Works Cloud Exposure Magic with Wiz & CyCognito ✨ Watch now Webinar: Wiz + CyCognito, Cloud Exposure Magic

CyCognito Blog

Your source for exposure management research, product news, and security insights.

Search the Blog

By Amit Sheps

CVE-2025-64095 is a critical file-upload vulnerability in DNN that allows unauthenticated attackers to overwrite site content and inject malicious code. Learn what’s affected, how to mitigate the risk, and how CyCognito helps identify vulnerable external assets.

Read more about Emerging Threat: CVE-2025-64095 – Critical Unauthenticated File Upload Vulnerability in DNN (DotNetNuke)
By Amit Sheps

CVE-2025-55752 is a path traversal vulnerability in Apache Tomcat that can bypass security controls and, in configurations allowing HTTP PUT, enable malicious file uploads leading to potential remote code execution. Proof-of-concept code is available, and cybersecurity authorities warn exploitation attempts are likely.

Read more about Emerging Threat: Apache Tomcat Vulnerability CVE-2025-55752
By Jason Pappalexis

This month’s CyCognito updates give security teams more precision, clarity, and control in exposure management. With the general availability of Teams for advanced role-based access control and enhanced service evidence for greater detection transparency, users gain deeper insights into their environments. Smarter search, streamlined navigation via the new Quick Start feature, and unified asset management improvements all support faster, more confident decision-making.

Read more about What’s New in CyCognito: July 2025 Platform Enhancements
By Zohar Venturero

We analyzed more than two million internet-exposed assets across cloud, on-prem, APIs, and web apps, discovered by our platform over the past 18 months. Using attacker-simulated testing, including black-box pentesting, dynamic application security testing (DAST), and active vulnerability scanning, we mapped how exploitable exposures cluster by industry and asset type. The results reveal systemic weaknesses in how organizations govern their digital perimeter, especially in environments shaped by rapid growth, third-party dependencies, and fragmented ownership.

Read more about What Over 2 Million Assets Reveal About Industry Vulnerability
By Jason Pappalexis

In today’s cybersecurity environment, visibility and action are everything. CyCognito’s May updates help security teams move faster, simplify operations, and close critical gaps in protection. From streamlined Azure cloud connector setup to a new WAF protection dashboard, historical DNS tracking, smarter domain discovery, and AI-powered issue verification, these enhancements are built to support proactive exposure management. Discover how these new capabilities can help your team secure what matters most without added complexity.

Read more about What’s New in CyCognito: June 2025 Platform Enhancements
By Naftali Kopilevich

CyCognito’s new Cloudflare integration expands its Cloud Connector capabilities, giving organizations deeper visibility into their external-facing assets. By accessing DNS records managed in Cloudflare, the platform uncovers forgotten or unmanaged domains and IPs that could pose security risks. This automated sync feeds directly into CyCognito’s discovery and testing engine, helping security teams identify vulnerabilities and reduce blind spots. With a quick setup and continuous monitoring, it’s a powerful step toward stronger, more comprehensive attack surface management.

Read more about CyCognito Integrates with Cloudflare for Direct Access to DNS
By Emma Zaballos

Cloud assets are increasingly vulnerable, now accounting for one-third of all easily exploitable security issues. Organizations using multi-cloud environments—especially outside the major providers—face significantly higher exposure to both critical and easily exploitable risks. To manage this growing threat, businesses need full visibility into their external attack surfaces and should adopt proactive, automated platforms like CyCognito to detect and remediate vulnerabilities quickly.

Read more about And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets