🎯 GigaOm Radar 2026: CyCognito is named an ASM Leader and Outperformer Full report 🎯 GigaOm: CyCognito is an ASM Leader and Outperformer

CyCognito Blog

Your source for exposure management research, product news, and security insights.

Search the Blog

By Igal Zeifman ・

Citrix has patched two vulnerabilities in NetScaler ADC and NetScaler Gateway — a critical memory overread (CVE-2026-3055) that lets unauthenticated attackers leak session tokens from SAML IDP-configured appliances, and a high-severity race condition (CVE-2026-4368) that can expose one user’s authenticated session to another. Given the rapid exploitation history of prior NetScaler memory-read flaws, organizations running affected on-premises builds should prioritize patching immediately

Read more about Citrix NetScaler ADC and Gateway Vulnerabilities (CVE-2026-3055 & CVE-2026-4368)
By Igal Zeifman ・

A maximum-severity path traversal in the Ubiquiti UniFi Network Application allows unauthenticated attackers to read and manipulate files on the underlying host, enabling full account takeover of the controller managing an organization’s switches, access points, and gateways.

Read more about Emerging Threat: Ubiquiti UniFi Network Application Path Traversal (CVE-2026-22557)
By Amit Sheps ・

CVE-2026-20127 is a critical authentication bypass in Cisco Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to centralized orchestration systems. Externally exposed SD-WAN infrastructure significantly increases enterprise risk, enabling policy manipulation, rogue peer insertion, and potential network-wide compromise.

Read more about Emerging Threat: Cisco Catalyst SD-WAN Authentication Bypass (CVE-2026-20127)
By Amit Sheps ・

CVE-2026-22769 is a hardcoded credential vulnerability in Dell RecoverPoint for VMs that can expose disaster recovery management interfaces to unauthorized access. Organizations with internet-reachable instances face elevated risk of administrative compromise and downstream infrastructure impact.

Read more about Emerging Threat – Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)
By Amit Sheps ・

Modern security frameworks often fail by surfacing endless vulnerabilities without context. This blog explores how the CTEM framework’s Validation stage provides “permission to ignore” theoretical risks, allowing teams to focus engineering resources exclusively on confirmed, evidence-based, and exploitable threats.

Read more about Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk