💡 White Paper: Operationalizing CTEM Through External Exposure Management Download now 💡 Operationalizing CTEM Through External Exposure Management

CyCognito Blog

Your source for exposure management research, product news, and security insights.

Search the Blog

By Amit Sheps ・

Continuous Threat Exposure Management (CTEM) shifts security metrics from measuring activity to prioritizing impact. This refocuses reporting on urgent, validated issues and continuous testing coverage. By tracking remediation hours and material exposure reduction, organizations can effectively manage risk without creating unnecessary noise or alert fatigue.

Read more about Moving From Activity to Impact: How CTEM Refocuses Security KPIs
By Amit Sheps ・

CVE-2026-24858 is an authentication bypass vulnerability in FortiCloud SSO that can expose internet-facing management interfaces to unauthorized access. This Emerging Threat highlights the risk posed by externally exposed control planes and the importance of continuous external asset visibility.

Read more about Emerging Threat: CVE-2026-24858 – FortiCloud SSO Authentication Bypass
By Amit Sheps ・

CVE-2025-15467 is a stack-based buffer overflow in OpenSSL CMS AuthEnvelopedData parsing. A crafted CMS message can corrupt memory before authentication, risking crashes or code execution in exposed services that process untrusted encrypted or signed content from external attackers over networks.

Read more about Emerging Threat: CVE-2025-15467 – OpenSSL CMS AuthEnvelopedData Stack-Based Buffer Overflow
By Amit Sheps ・

CVE-2026-24061 is a newly assigned vulnerability that may allow remote code execution in externally exposed services due to improper input validation. Limited public details and lack of patches increase uncertainty, making comprehensive external asset visibility critical for effective risk assessment.

Read more about Emerging Threat: CVE-2026-24061 – Telnet Authentication Bypass in GNU Inetutils
By Zohar Venturero ・

Our new study looks under the hood of domain-to-IP volatility to understand how modern infrastructure behaves and why it matters for enterprise security operations. Read the research for a deeper look at the mechanics behind changing DNS resolution and what it means for tracking assets and exposure over time.

Read more about Domain-to-IP Volatility at Scale: A Study of 4 Million Enterprise Domains
By Amit Sheps ・

CVE-2026-21858, CVE-2025-68613, and CVE-2026-21877 expose critical remote code execution risks in n8n workflow automation. This blog outlines affected assets, available fixes, exploitation status, and recommended actions, and explains how CyCognito helps organizations identify exposed instances and reduce external risk effectively.

Read more about Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 – n8n Workflow Automation Vulnerabilities