Home

The home page serves as a centralized dashboard for users to quickly assess the organization’s current external risk levels, track changes over time, and dive deeper into specific vulnerabilities. It’s designed to offer immediate insights, allowing security teams to understand the health of their external security posture.

Home Page

Continuous Monitoring Status

At the top, there’s an indicator showing that "Cybral Storm is continuously running," which confirms that the system is actively monitoring and scanning external assets for vulnerabilities. Users can use the toggle to stop the continuous monitoring if needed, giving them control over the scanning process.

Continuously Running Feature

Scan Schedule

Next to the monitoring status, the “Time to Next Scan” field shows a countdown timer, indicating when the next automated scan is scheduled to begin.

Time Next to Scan

Minimal Risk Summary

The main panel displays the current Risk Score, which is presented as a percentage. In this example, the score is 12.26%, categorized as “Minimal Risk,” with a recommendation to "Continue regular monitoring.

Minimal Risk

Vulnerability Breakdown

  • Breakdown of vulnerabilities by category:

    • Network Vulnerability: Indicates the number of detected vulnerabilities in the network infrastructure.

    • Web Vulnerability: Indicates the number of detected vulnerabilities in web applications

Vulnerabilities

Health Trend

To the right, the Health Trend section provides a graphical representation of the risk score over time.

There’s also a "Since Last Scan" metric showing a 0.00% change, which indicates stability in the risk score since the previous scan.

Health Trend

This section displays a quick overview of the current external assets being monitored by XASM. It includes:

  1. Assets: Shows the total number of external assets detected, currently listed as 33.

  2. Subdomains: Displays the number of subdomains associated with the organization. In this case, the count is 0, indicating that no subdomains have been detected or are being monitored at the moment.

  3. IP Addresses: Indicates the number of IP addresses associated with the organization’s external assets, also counted as 33.

External Assets Overview

Assets Security Posture Analysis

It provides an overview of the security status of each asset based on its vulnerability level, and exposure to potential threats.

  1. Strong Assets: This category lists assets with a strong security posture, meaning they are well-protected and have minimal exposure to vulnerabilities.

  2. Moderate Assets: Assets in this category have a moderate level of security, with some vulnerabilities that could be exploited but aren’t so critical.

  3. Exploitable Assets: Assets marked as exploitable have vulnerabilities that attackers could potentially exploit. These assets pose a higher risk than moderate ones.

  4. Highly Exploitable Assets: This category is reserved for assets with severe vulnerabilities that are highly exposed to exploitation. These assets represent the most critical risk and demand urgent action.

Assets Security Posture

Remediation

This section provides a quick summary of vulnerabilities detected by the Storm AI Engine for the mentioned domain. Here’s an overview of the key information displayed above:

  • Assets Detected: The Storm AI Engine has identified 33 assets associated with the specified domain.

  • Network Vulnerabilities: One network vulnerability has been detected, indicating a potential risk within the network infrastructure.

  • Web Vulnerabilities: Two web vulnerabilities have been identified, highlighting risks specific to the web applications.

A button labeled Generate Defense Strategy is available, allowing users to view recommended actions to address these vulnerabilities.

Each element—assets, network vulnerabilities, and web vulnerabilities—will be discussed in greater detail in later sections.

Generate Defense Strategy

Social Engineering Data

The Social Data Scanning module provides detailed insights into employees' departmental information and associated data. It shows and automates phishing attack scenarios to identify vulnerabilities and misuse of employee-related data. This analysis highlights how publicly available data can be exploited, enabling organizations to understand risk exposure by the department.

Risk Score and Phishing Attempts Chart:

  • A bar chart compares Risk Scores and Phishing Attempts across different departments:

    • Technical: Shows a higher risk score and phishing attempts, indicating this department may be more targeted or vulnerable.

    • Social: Displays balanced risk and phishing attempts, showing moderate exposure.

    • Finance: Shows equal values for risk and phishing attempts, suggesting stable but notable social engineering risks.

    • Marketing: Displays lower values, suggesting less exposure to social engineering attempts compared to other departments.

    • Product: Shows the lowest risk and phishing attempts, indicating minimal social engineering vulnerabilities.

Social Engineering Data

Navigation Arrow:

  • The Show arrow directs the user to the Social page for more detailed information, which will be discussed later.

Show Arrow

Vulnerabilities Frequency,

Provides a visual representation of all vulnerability frequencies within the system. The pie chart displays vulnerabilities identified by their CVE codes. This representation highlights the different vulnerabilities detected within the system. The Show arrow allows the user to navigate to the "Attack Surface Management" page for more details regarding the vulnerability frequency data.

vulnerabilities Frequency

Vulnerabilities Distribution

It provides an overview of the severity levels for vulnerabilities detected in the system. The vulnerabilities are categorized into four levels of severity: Critical, High, Medium, and Low.

  • Critical: No critical vulnerabilities are present, indicated by the 0 value under this category.

  • High: No high-severity vulnerabilities have been detected, also marked as 0.

  • Medium: There are no medium-severity vulnerabilities, with this category showing a count of 0.

  • Low: Only one vulnerability falls under the low severity category, marked with a 1.

Vulnerabilities Distribution

Last updated