The Platform

Enable your security and operations teams to proactively identify, prioritize, and remediate exposures to stay ahead of attackers.

Watch a Demo
GigaOm Radar for Attack Surface Management

The expansion of an organization's attack surface continues to present a critical business challenge. Download the GigaOm Radar for Attack Surface Management to get an overview of the available ASM solutions, identify leading offerings, and evaluate the best solution for you.  

Use Cases

The CyCognito platform helps you identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface.

State of External Exposure Management

Download CyCognito’s State of External Exposure Management Report to learn key recommendations that your Security teams can implement to improve their exposure management strategy and minimize risk. 

Our Customers

External attack surface management is advancing cybersecurity into a new era. Learn how security experts across all industries benefit from using CyCognito’s platform.

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

About CyCognito

We believe all organizations should be able to protect themselves from even the most sophisticated attackers.

Contact us

The knowledge you need to manage and protect your attack surface.

What's New Blog

What Is Vulnerability Scanning?

Vulnerability scanning is the systematic examination of an IT environment to identify security weaknesses that could be exploited by attackers. It involves scanning systems, networks, and applications to uncover vulnerabilities such as missing patches, outdated software, and misconfigurations.

Vulnerability scanning helps organizations stay ahead of potential threats by identifying and addressing vulnerabilities before they cause damage. By conducting regular vulnerability scans, organizations can identify and fix vulnerabilities before they are exploited, reducing the risk of security breaches and data loss.

In addition to identifying vulnerabilities, it’s also important to manage them. Vulnerability scanning helps by analyzing the identified vulnerabilities, assessing their potential impact on the organization, and prioritizing their resolution based on their severity. This way, organizations can ensure they are focusing their resources on mitigating the most critical vulnerabilities.

This is part of a series of articles about vulnerability assessment.

Key Steps in the Vulnerability Scanning Process

Here are the primary stages of a vulnerability scanning process. These steps describe an unauthenticated scan; many vulnerability scanners are able to scan authenticated systems, and this might involve some additional steps, which are beyond our scope.

1. Selecting a Range of IP Addresses to Scan

In most types of vulnerability scans, an IP address range can be used to define the scope of the scan. It's crucial to cover all devices connected to your network, as any unscanned device could have severe vulnerabilities. The IP range or ranges you select depends on the size and complexity of your network. Once the IP address range is defined, the scanning tool can begin probing each device for potential vulnerabilities.

Getting the right IP range is important. You don't want to miss out on any potential vulnerabilities by leaving out certain addresses. On the other hand, if you enter too wide a range, you could end up scanning devices that aren't part of your network, wasting time and resources. Another important aspect is adding an IP denylist. There is sometimes a need to avoid scanning some devices, for example because the scan could disrupt their operations.

2. Discovery Scan

At this stage, the vulnerability scanning tool probes the defined range of IP addresses to identify open ports and services. This starts with host enumeration, which involves identifying the hosts or devices present on the network. Each of these hosts could be running multiple services, each with its own set of vulnerabilities. Once hosts are enumerated, the next step is typically port scanning, or identifying which ports are open on these hosts. This is a critical step because each open port represents a service that could potentially be vulnerable.

3. Capturing Software Versions of Running Services (CPEs)

The next step is to capture the software versions, or Common Platform Enumerations (CPEs), of the running services. Every software version has a unique set of vulnerabilities, and knowing the exact version helps in identifying these vulnerabilities accurately.

CPEs provide a standardized method of naming and describing the software and hardware components on a system. This standardization allows vulnerability databases and scanning tools to communicate effectively, ensuring that all potential vulnerabilities are identified and reported accurately.

4. Comparing CPEs with Vulnerability Databases

After the software versions have been captured, the next step is to compare these CPEs with vulnerability databases. These databases, such as the National Vulnerability Database (NVD), contain a comprehensive list of known vulnerabilities associated with various software versions.

By comparing the CPEs with the vulnerability databases, the scanning tool can identify any known vulnerabilities associated with the running services on your network. This step allows you to identify the exact vulnerabilities present on your network, enabling you to take steps to mitigate them.

5. Classifying Detected CVEs

Once the known vulnerabilities have been identified, the next step is to classify them based on their severity. This classification helps in prioritizing the remediation efforts, with the most severe vulnerabilities being addressed first.

The classification of Common Vulnerabilities and Exposures (CVEs) typically involves assigning a severity score to each vulnerability. This severity score, calculated using scoring systems such as the Common Vulnerability Scoring System (CVSS) v3 or the Exploit Prediction Scoring System (EPSS), takes into account various factors such as the potential impact of the vulnerability and the complexity of exploiting it. The higher the score, the more severe the vulnerability.

6. Reporting on Vulnerabilities

The final step in the vulnerability scanning process is reporting on the identified vulnerabilities. This report typically includes details such as the affected hosts, the identified vulnerabilities, their severity scores, and recommended remediation actions. This is typically the final product of an automated vulnerability scanning tool.

How Often Should You Perform Vulnerability Scanning?

External vs. Internal Scanning

The frequency of vulnerability scanning depends on various factors such as the size and complexity of your network, the sensitivity of the data it handles, and the regulatory requirements your organization needs to comply with. However, as a general rule of thumb, it's recommended to perform vulnerability scanning on a regular basis, preferably at least once a week, or even daily for sensitive systems.

Regular vulnerability scanning allows you to stay on top of new vulnerabilities that may have been introduced since the last scan. It also enables you to verify that the remediation actions taken after the last scan have been effective in mitigating the identified vulnerabilities.

11 Things to Consider When Evaluating a Vulnerability Scanner

Evaluating a vulnerability scanner involves considering several factors to ensure it meets your organization's security requirements. Here are key aspects to consider:

  1. Accuracy and comprehensiveness: The scanner should accurately identify vulnerabilities without producing too many false positives or negatives. It should cover a wide range of vulnerabilities based on comprehensive threat intelligence
  2. Scanning scope: Ensure the scanner covers the assets you need tested, for example web applications, cloud resources, or APIs, understanding that additional scanning capabilities may impact performance negatively.
  3. Scanning speed and performance: Evaluate how quickly and efficiently the scanner can complete a scan without significantly impacting network or system performance.
  4. Ease of use: The scanner's interface should be intuitive, making it easy for users to configure scans, understand reports, and manage vulnerabilities.
  5. Integration capabilities: Look for scanners that can integrate well with other security tools and systems, such as intrusion detection systems, security information and event management (SIEM) solutions, and patch management tools.
  6. Reporting and analytics: The scanner should offer detailed, actionable reports that clearly categorize vulnerabilities by severity and provide remediation guidance. Analytics features can help track vulnerability trends over time.
  7. Support for different environments: Ensure the scanner supports the various technologies used in your environment, including cloud services, web applications, and all operating systems.
  8. Regular updates: The scanner must receive regular updates to its vulnerability database to recognize the newest vulnerabilities and threats.
  9. Compliance checks: If relevant, choose a scanner that can assess compliance with standards and regulations applicable to your industry, such as PCI DSS, HIPAA, or GDPR.
  10. Vendor support and community: Consider the level of support provided by the vendor, including documentation, customer service, and access to a community for sharing best practices.
  11. Cost-effectiveness: Finally, evaluate the total cost of ownership, including licensing, maintenance, and any required hardware or additional services.

Related content: Read our guide to vulnerability scanner for website.

Vulnerability Management with CyCognito Attack Surface Management Platform

The CyCognito platform addresses today’s vulnerability management requirements by taking an automated multi-faceted approach in identifying and remediating critical issues based on their business impact, rather than focusing on the generic severity of the threat alone. To do this you need a platform that is continuously monitoring the attack surface for changes and provides intelligent prioritization that incorporates organizations context.

The CyCognito platform addresses today’s vulnerability management requirements by:

  • Maintaining a dynamic asset inventory: Including exposed on-premise and cloud-hosted assets like web applications, IP addresses, domains and certificates, eliminating the need for info from collaboration tools, spreadsheets, or emails.
  • Actively testing all discovered assets: Dynamic application security testing (DAST) uncovers complex issues and validates known issues, with low false positives. Each exploited asset is assigned a security grade based on its criticality to the business.
  • Prioritizing critical issues: Our unique risk-based prioritization analysis goes beyond the common vulnerability scoring system (CVSS), and incorporates factors like asset discoverability, asset attractiveness, exploitability, business impact and remediation complexity, with integrated tactical threat intelligence.
  • Streamlining remediation communications: We provide comprehensive, verifiable evidence for each exploited asset. This includes detailed risk assessments, asset ownership information, and actionable remediation guidance. The platform seamlessly integrates with SIEM, SOAR and ticketing system like Jira and ServiceNow.

Learn more about the CyCognito platform.

Watch an 8-Minute Demo of the Cycognito Platform

In a short demo video see how the CyCognito platform uses nation-state-scale reconnaissance and offensive security techniques to close the gaps left by other security solutions including attack surface management products, vulnerability scanners, penetration testing, and security ratings services.