Home
The home page serves as a centralized dashboard for users to quickly assess the organization’s current external risk levels, track changes over time, and dive deeper into specific vulnerabilities. It’s designed to offer immediate insights, allowing security teams to understand the health of their external security posture.

Continuous Monitoring Status
At the top, there’s an indicator showing that "Cybral Storm is continuously running," which confirms that the system is actively monitoring and scanning external assets for vulnerabilities. Users can use the toggle to stop the continuous monitoring if needed, giving them control over the scanning process.

Scan Schedule
Next to the monitoring status, the “Time to Next Scan” field shows a countdown timer, indicating when the next automated scan is scheduled to begin.

Minimal Risk Summary
The main panel displays the current Risk Score, which is presented as a percentage. In this example, the score is 12.26%, categorized as “Minimal Risk,” with a recommendation to "Continue regular monitoring.

Vulnerability Breakdown
Breakdown of vulnerabilities by category:
Network Vulnerability: Indicates the number of detected vulnerabilities in the network infrastructure.
Web Vulnerability: Indicates the number of detected vulnerabilities in web applications

Health Trend
To the right, the Health Trend section provides a graphical representation of the risk score over time.
There’s also a "Since Last Scan" metric showing a 0.00% change, which indicates stability in the risk score since the previous scan.

This section displays a quick overview of the current external assets being monitored by XASM. It includes:
Assets: Shows the total number of external assets detected, currently listed as 33.
Subdomains: Displays the number of subdomains associated with the organization. In this case, the count is 0, indicating that no subdomains have been detected or are being monitored at the moment.
IP Addresses: Indicates the number of IP addresses associated with the organization’s external assets, also counted as 33.

Assets Security Posture Analysis
It provides an overview of the security status of each asset based on its vulnerability level, and exposure to potential threats.
Strong Assets: This category lists assets with a strong security posture, meaning they are well-protected and have minimal exposure to vulnerabilities.
Moderate Assets: Assets in this category have a moderate level of security, with some vulnerabilities that could be exploited but aren’t so critical.
Exploitable Assets: Assets marked as exploitable have vulnerabilities that attackers could potentially exploit. These assets pose a higher risk than moderate ones.
Highly Exploitable Assets: This category is reserved for assets with severe vulnerabilities that are highly exposed to exploitation. These assets represent the most critical risk and demand urgent action.

Remediation
This section provides a quick summary of vulnerabilities detected by the Storm AI Engine for the mentioned domain. Here’s an overview of the key information displayed above:
Assets Detected: The Storm AI Engine has identified 33 assets associated with the specified domain.
Network Vulnerabilities: One network vulnerability has been detected, indicating a potential risk within the network infrastructure.
Web Vulnerabilities: Two web vulnerabilities have been identified, highlighting risks specific to the web applications.
A button labeled Generate Defense Strategy is available, allowing users to view recommended actions to address these vulnerabilities.
Each element—assets, network vulnerabilities, and web vulnerabilities—will be discussed in greater detail in later sections.

Social Engineering Data
The Social Data Scanning module provides detailed insights into employees' departmental information and associated data. It shows and automates phishing attack scenarios to identify vulnerabilities and misuse of employee-related data. This analysis highlights how publicly available data can be exploited, enabling organizations to understand risk exposure by the department.
Risk Score and Phishing Attempts Chart:
A bar chart compares Risk Scores and Phishing Attempts across different departments:
Technical: Shows a higher risk score and phishing attempts, indicating this department may be more targeted or vulnerable.
Social: Displays balanced risk and phishing attempts, showing moderate exposure.
Finance: Shows equal values for risk and phishing attempts, suggesting stable but notable social engineering risks.
Marketing: Displays lower values, suggesting less exposure to social engineering attempts compared to other departments.
Product: Shows the lowest risk and phishing attempts, indicating minimal social engineering vulnerabilities.

Navigation Arrow:
The Show arrow directs the user to the Social page for more detailed information, which will be discussed later.

Vulnerabilities Frequency,
Provides a visual representation of all vulnerability frequencies within the system. The pie chart displays vulnerabilities identified by their CVE codes. This representation highlights the different vulnerabilities detected within the system. The Show arrow allows the user to navigate to the "Attack Surface Management" page for more details regarding the vulnerability frequency data.

Vulnerabilities Distribution
It provides an overview of the severity levels for vulnerabilities detected in the system. The vulnerabilities are categorized into four levels of severity: Critical, High, Medium, and Low.
Critical: No critical vulnerabilities are present, indicated by the 0 value under this category.
High: No high-severity vulnerabilities have been detected, also marked as 0.
Medium: There are no medium-severity vulnerabilities, with this category showing a count of 0.
Low: Only one vulnerability falls under the low severity category, marked with a 1.

Last updated