Webinar: ✨ How Colgate-Palmolive Works Cloud Exposure Magic with Wiz & CyCognito ✨ Watch now Webinar: Wiz + CyCognito, Cloud Exposure Magic

CyCognito Blog

Your source for exposure management research, product news, and security insights.

Search the Blog

By Jason Pappalexis

Security teams are under constant pressure to find and fix vulnerabilities faster, but traditional approaches to security testing often create delays. In this blog, we explore why active security testing, despite its perception for being slow and resource intensive, is the key to achieving faster and more confident fixes. You will learn how accurate testing results drive smarter remediation decisions, how fully automated testing at scale overcomes common operational challenges, and why reducing your window of exposure requires moving beyond passive scanning. If your organization is struggling with long remediation cycles and hidden risks, this is the blueprint for accelerating your security outcomes.

Read more about Faster Fixes: Solving the Security Testing Trade-off
By Graham Rance

External Attack Surface Management (EASM) promised to illuminate the unknown, but early tools barely scratched the surface, relying on what security teams already knew. Today’s attacker-centric EASM flips the script, discovering unknown assets, mapping them to the business, and validating real-world risk with zero input. The result isn’t just visibility—it’s proof of exposure, and a clear path to action.

Read more about External Attack Surface Management Promised Visibility — But Did It Deliver?
By Emma Zaballos

On April 24, 2025, SAP disclosed CVE-2025-31324, a critical vulnerability (CVSS 10.0) in the Metadata Uploader of SAP NetWeaver Visual Composer 7.50, which is actively exploited. SAP released a patch, with details limited to customers, alongside other mitigation options. CyCognito has deployed detection tests and provides customers with asset lists to assess and validate remediation efforts.

Read more about Emerging Threat: SAP NetWeaver Visual Composer CVE-2025-31324
By Jason Pappalexis

Cloud-Native Application Protection Platforms (CNAPPs) offer robust internal visibility, but they often fall short in identifying externally exposed assets and real-world vulnerabilities. This blog explores how CyCognito fills these critical gaps by bringing blackbox asset discovery and dynamic application security testing (DAST) to CNAPP workflows, in partnership with Wiz. Through seedless discovery and over 80,000 active security tests, CyCognito helps uncover hidden risks that internal tools miss, enabling DevSecOps teams to prioritize issues based on actual exploitability. The integration provides seamless data flow between platforms, delivering enriched context and actionable insights that significantly enhance cloud security posture.

Read more about Black Box Discovery and DAST: CyCognito’s Integration with Wiz
By Emma Zaballos

CVE-2025-22457 is a critical buffer overflow vulnerability (CVSS 9.0) in Ivanti Connect Secure, Policy Secure, and ZTA Gateways, enabling unauthenticated remote code execution via a crafted X-Forwarded-For header. It has been actively exploited by espionage group UNC5221 and is listed in CISA’s KEV catalog. Patches are available for most affected products, but legacy Pulse Connect Secure devices require migration, and customers are advised to monitor for signs of compromise.

Read more about Emerging Threat: Ivanti CVE-2025-22457
By Emma Zaballos

CVE-2025-29927 is a critical authorization vulnerability (CVSS 9.1) in self-hosted Next.js applications using middleware, allowing attackers to bypass security checks with a crafted x-middleware-subrequest header. It affects versions 11.1.5 to 15.2.2, with patches available in newer releases. While there are no active exploits reported as of March 27, 2025, CyCognito has issued guidance to help organizations assess and mitigate exposure.

Read more about Emerging Threat: Next.js CVE-2025-29927
By Shahar Agmon

Managing cybersecurity with constantly changing IP addresses can feel like chasing a moving target. Dynamic IPs, such as from content delivery networks and load balancers, create security blind spots and reduce asset visibility. Without appropriate context and history, security teams waste time on noise while real threats go unnoticed. This blog explores the challenges of dynamic IPs and how CyCognito helps organizations cut through the clutter for clear, actionable security insights.

Read more about Dynamic IPs Are Breaking Security — Here’s How to Fix It
By Rob Gurzeev

As manufacturing enterprises adopt digital transformation, integrating SCADA with cloud-based solutions introduces serious cybersecurity risks. This case study highlights how a Fortune 500 manufacturer inadvertently exposed SCADA systems to the internet, making them vulnerable to attacks. Traditional security tools failed to detect these exposures due to blind spots in asset inventory and reliance on predefined IP ranges. By leveraging external exposure management, the company identified and remediated these risks before exploitation. This incident underscores the need for continuous attack surface monitoring, risk-based prioritization, and automated asset discovery to secure operational technology (OT) environments against emerging threats.

Read more about Security Risks in Internet-exposed SCADA in Manufacturing
By Emma Zaballos

On January 14, 2025, Fortinet disclosed a new critical (CVSS 9.8) authentication bypass vulnerability affecting FortiOS and FortiProxy. CVE-2024-55591 allows unauthenticated remote attackers to target the Node.js WebSocket module of the administrative interface and potentially gain super-admin privileges. CyCognito is helping customers identify assets vulnerable to CVE-2024-55591.

Read more about Emerging Threat: Fortinet CVE-2024-55591