🎯 GigaOm Radar 2026: CyCognito is named an ASM Leader and Outperformer Full report 🎯 GigaOm: CyCognito is an ASM Leader and Outperformer
CyCognito Blog

Posts by Amit Sheps

Search the Blog

Amit Sheps

Amit Sheps

Head of Product Marketing

Amit Sheps is a product marketing leader focused on making the cyber world safer. He’s spent years working across external and internal attack surface management and helping organizations protect OT, IoT, and cloud environments from real-world threats.

By Amit Sheps

CVE-2026-20127 is a critical authentication bypass in Cisco Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to centralized orchestration systems. Externally exposed SD-WAN infrastructure significantly increases enterprise risk, enabling policy manipulation, rogue peer insertion, and potential network-wide compromise.

Read more about Emerging Threat: Cisco Catalyst SD-WAN Authentication Bypass (CVE-2026-20127)
By Amit Sheps

CVE-2026-22769 is a hardcoded credential vulnerability in Dell RecoverPoint for VMs that can expose disaster recovery management interfaces to unauthorized access. Organizations with internet-reachable instances face elevated risk of administrative compromise and downstream infrastructure impact.

Read more about Emerging Threat – Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)
By Amit Sheps

Modern security frameworks often fail by surfacing endless vulnerabilities without context. This blog explores how the CTEM framework’s Validation stage provides “permission to ignore” theoretical risks, allowing teams to focus engineering resources exclusively on confirmed, evidence-based, and exploitable threats.

Read more about Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk
By Amit Sheps

CVE-2026-1731 affects BeyondTrust privileged access deployments, introducing potential risk to internet-facing administrative interfaces. External exposure data shows cross-industry impact, particularly in technology, hospitality, healthcare, and energy sectors, where exposed access management systems may expand attackers’ paths to high-value enterprise infrastructure.

Read more about Emerging Threat: CVE-2026-1731 – BeyondTrust Privileged Access Exposure Risk
By Amit Sheps

Continuous Threat Exposure Management (CTEM) shifts security metrics from measuring activity to prioritizing impact. This refocuses reporting on urgent, validated issues and continuous testing coverage. By tracking remediation hours and material exposure reduction, organizations can effectively manage risk without creating unnecessary noise or alert fatigue.

Read more about From Activity to Impact: How CTEM Refocuses Security KPIs
By Amit Sheps

CVE-2026-24858 is an authentication bypass vulnerability in FortiCloud SSO that can expose internet-facing management interfaces to unauthorized access. This Emerging Threat highlights the risk posed by externally exposed control planes and the importance of continuous external asset visibility.

Read more about Emerging Threat: CVE-2026-24858 – FortiCloud SSO Authentication Bypass
By Amit Sheps

CVE-2025-15467 is a stack-based buffer overflow in OpenSSL CMS AuthEnvelopedData parsing. A crafted CMS message can corrupt memory before authentication, risking crashes or code execution in exposed services that process untrusted encrypted or signed content from external attackers over networks.

Read more about Emerging Threat: CVE-2025-15467 – OpenSSL CMS AuthEnvelopedData Stack-Based Buffer Overflow
By Amit Sheps

CVE-2026-24061 is a newly assigned vulnerability that may allow remote code execution in externally exposed services due to improper input validation. Limited public details and lack of patches increase uncertainty, making comprehensive external asset visibility critical for effective risk assessment.

Read more about Emerging Threat: CVE-2026-24061 – Telnet Authentication Bypass in GNU Inetutils