Cyber Situation Report

Are you a national CERT interested in how severely your country is affected by a new type of zero-day vulnerability?

Do you want to analyze all vulnerable systems within a specific sector, such as healthcare?

We conduct global scans for you and create a detailed cyber situation report. Our data and analysis help ensure that you have the best possible protection for your cyber infrastructure.

With our Decentralized Cyber Reconnaissance System (DCS), you can generate global cyber situation reports tailored to specific threats. We use various visualization options, including the creation of maps and the illustration of international trends related to newly discovered vulnerabilities over time. Together, we customize DCS to your needs and develop automated dashboards and alerts.

Global real-time analysis

Distribution analysis

Comprehensive topology / structural analysis

Identification of all external assets

See your national attack surface in real time

Request a Demo

CYBER SITUATION REPORT

Vulnerable Citrix / NetScaler Server

The side-by-side comparison of the two heatmaps shows how the data we generate can be used for cyber situation reports. We used recurrent scans to visualize the development of the number of vulnerable servers for the Citrix / NetScaler vulnerability CVE-2023-24488 published in July 2023. The heatmaps illustrate the difference in scan results between July 10, 2023, and July 24, 2023, highlighting the positive trend.

The vulnerability in Citrix ADC and Citrix Gateway allows an attacker to perform cross site scripting. Reflective Cross-Site Scripting (RXSS) can be used for cookie theft or redirection and may only require a user to click a link on a seemingly legitimate domain.

CYBER RADAR

Keep everything on the radar with interactive dashboards

Cyber Radarhelps you identify fundamental correlations of service distributions on the Internet. The scan results can be interactively grouped and analyzed by countries, Autonomous Systems (AS), IP prefixes or other domains.

This enables you to quickly identify new vulnerabilities or potentially vulnerable services spreading across your national cyber infrastructure. Interactive dashboards help you keep track of your critical infrastructures as a national CERT.

More info about Cyber Radar

This example provides a quick overview of the distribution of Telenet services and associated network structures or information. These distribution analysis of various protocols or vulnerabilities can also be performed for specific countries, continents or even companies. This means that it is possible to perform fast global factual correlations and infrastructure analysis.

  • The inner circle of the cyber radar shows the distribution of the identified Telnet services across the top 5 networks (autonomous systems) on the Internet.
  • The second circle shows the distribution of the top 5 matching WhoIs description entries.  These WhoIs descriptions often indicate the purpose or location of the identified asset.
  • The third circle indicates which network prefixes belong to the previously displayed WhoIs descriptions.
  • The fourth layer visualizes aggregation of the different telnet service banners.

GET THE HACKER’S PERSPECTIVE

Request a Demo