🎯 GigaOm Radar 2026: CyCognito is named an ASM Leader and Outperformer Full report 🎯 GigaOm: CyCognito is an ASM Leader and Outperformer
CyCognito Blog

Research

Search the Blog

By Amit Sheps ・

CVE-2025-37164 is a critical unauthenticated remote code execution vulnerability in HPE OneView. Because OneView serves as a privileged infrastructure management platform, successful exploitation can grant attackers broad control over managed systems, increasing the risk of lateral movement and downstream compromise.

Read more about Emerging Threat: CVE-2025-37164 – Critical Unauthenticated Remote Code Execution in HPE OneView
By Amit Sheps ・

CVE-2025-14733 is a high-severity authentication bypass vulnerability that can allow unauthenticated access to protected web applications and APIs. This blog explains affected assets, potential risk, available fixes, recommended actions, and how CyCognito helps organizations identify and reduce exposure.

Read more about Emerging Threat: CVE-2025-14733 –  Authentication Bypass Vulnerability
By Amit Sheps ・

CVE-2025-55182 is a critical RCE vulnerability in React Server Components affecting React 19 and Next.js applications. This blog explains what’s impacted, how attackers can exploit it, available patches, recommended actions, and how CyCognito helps organizations identify and prioritize exposed assets.

Read more about Emerging Threat: CVE-2025-55182 (React2Shell) – React Server Components RCE Vulnerability
By Amit Sheps ・

CVE-2025-41115 is a critical privilege escalation and user impersonation vulnerability in Grafana Enterprise. An attacker who exploits it can impersonate an administrator, modify dashboards and alerts, access connected databases and observability data, and pivot into other integrated systems.

Read more about Emerging Threat: CVE-2025-41115 – Critical SCIM Privilege Escalation in Grafana Enterprise
By Amit Sheps ・

CVE-2025-64095 is a critical file-upload vulnerability in DNN that allows unauthenticated attackers to overwrite site content and inject malicious code. Learn what’s affected, how to mitigate the risk, and how CyCognito helps identify vulnerable external assets.

Read more about Emerging Threat: CVE-2025-64095 – Critical Unauthenticated File Upload Vulnerability in DNN (DotNetNuke)
By Amit Sheps ・

CVE-2025-55752 is a path traversal vulnerability in Apache Tomcat that can bypass security controls and, in configurations allowing HTTP PUT, enable malicious file uploads leading to potential remote code execution. Proof-of-concept code is available, and cybersecurity authorities warn exploitation attempts are likely.

Read more about Emerging Threat: Apache Tomcat Vulnerability CVE-2025-55752
By Zohar Venturero ・

We analyzed more than two million internet-exposed assets across cloud, on-prem, APIs, and web apps, discovered by our platform over the past 18 months. Using attacker-simulated testing, including black-box pentesting, dynamic application security testing (DAST), and active vulnerability scanning, we mapped how exploitable exposures cluster by industry and asset type. The results reveal systemic weaknesses in how organizations govern their digital perimeter, especially in environments shaped by rapid growth, third-party dependencies, and fragmented ownership.

Read more about What Over 2 Million Assets Reveal About Industry Vulnerability
By Emma Zaballos ・

Cloud assets are increasingly vulnerable, now accounting for one-third of all easily exploitable security issues. Organizations using multi-cloud environments—especially outside the major providers—face significantly higher exposure to both critical and easily exploitable risks. To manage this growing threat, businesses need full visibility into their external attack surfaces and should adopt proactive, automated platforms like CyCognito to detect and remediate vulnerabilities quickly.

Read more about And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets