2025.11
Features & Enhancements
High Value Targeting (HVT) & Advanced Data Pilfering (ADP)
-
Enriched Business Risk Explanations: Pentest results now provide clearer context on why a High Value Target (HVT) leads to a Business Risk. This includes a brief explanation and additional real-world examples based on the LLM-inferred categories associated with the HVT.
- This enriched data is also included in the pentest summary in the portal.
-
AI-Enriched Items: A
genAIbadge has been added to the credentials table to highlight items that have been enriched with AI/LLM data. - The attack graph display for Business Risk has been updated for clearer prioritization.
Vulnerability Risk Intelligence (VRI)
- Early Access Release: Initial release of the Vulnerability Risk Intelligence solution is available, offering enhanced weakness details and reporting.
- Scanner File Handling: Improved support for Nessus file types, hardened parsing logic, and clearer user-facing error messages during scanner file uploads.
- Users can now change the scanner file name after upload.
- The main table now includes a hostnames column, and the classification CSV export includes host, mitigations, and references.
- Added CISA filters to the weaknesses table to support CISA-focused workflows.
- Updated one-click-verify (1cv) behavior to allow 1cv in the single-select menu for relevant operations.
Platform & Usability Enhancements
- Pentest Compare: Added new filters to the pentest comparison view to streamline analysis.
- Cloud Connections: Added text search and pagination capabilities for cloud connections within the pentest configuration process.
- Vulnerability Management Hub (VMH): The Notes column is now sortable, and filters have been added for first and last seen dates.
- Pentest Template Management: The pentest templates page now sorts templates by date and displays the created date.
- Cloud Cracking: Cloud cracking is now used for all production cracking operations in both the US and EU regions.
- New Event Type: Added a new internal event type:
PRIVILEGE_ESCALATION.
New Attack Content
- Windows Server Update Services (WSUS): Updated Rapid Response test card for WSUS misconfigurations.
- N-able N-central: Released a Rapid Response test card and targeted test for recent zero-day vulnerabilities.
- CVE-2025-9316: N-able N-central vulnerability that allows unauthenticated attackers to bypass authentication, potentially gaining unauthorized access to privileged APIs.
- CVE-2025-11700:N-able N-central vulnerability that allows unauthenticated attackers to read sensitive files via XML External Entity (XXE) injection.
- SCCM Takeover 2: New weakness added for SCCM-related misconfiguration leading to takeover.
- LAPS Password Exposure: New weakness added for misconfigurations leading to exposure of Local Administrator Password Solution (LAPS) passwords.
- First Windows Privilege Escalation: New attack path focusing on initial Windows privilege escalation.
- Fortiweb (CVE-2025-64446): A zero-day vulnerability that allows unauthenticated attackers to execute arbitrary code on affected appliances due to improper input validation, enabling full system compromise.
- Gladinet Triofox (CVE-2025-12480): An Improper Access Control vulnerability that allows unauthorized users to access or modify restricted files and settings, potentially leading to data exposure or system misuse.
- Monsta (CVE-2025-34299): A zero-day vulnerability that can allow unauthenticated attackers to exploit the system, potentially leading to partial data exposure or targeted compromise.
Platform Performance & Stability
- External Asset Discovery Optimization Asset discovery calculations have been moved to the database layer, leading to an 85% reduction in result set size and significantly faster query times for clients with large asset groups.
- ETL Configuration Implemented automatic massive ETL triggering for asset jobs when size estimates exceed defined thresholds, which prevents workflow failures during large-scale operations.
- PDF Reporting Timeout: Resolved a critical issue that caused PDF pentest reports to time out during generation.
Bug Fixes
- Double Dash Domain Support: Fixed a bug to allow support for domains containing double dashes (e.g.,
client--corp.com). - Asset Matching: Fixed a bug where hosts with the same primary IP but different ephemeral secondary IPs failed to match across operations.
- White Labeling: Resolved a cascading bug that prevented MSP parent accounts from properly applying feature toggles (Tripwires, Rapid Response, Insights) to subclients, and fixed a bug preventing white label logos from displaying correctly on the dashboard.
- Read Only User Banner: Fixed an issue where the Read Only banner was missing for users with read-only roles.
- Scheduled Actions: Fixed a bug to enable pause/resume capabilities for automating pentest schedules.
- H3 Sample Account: Fixed security and usability issues by hiding the Grant Access and Revoke Access buttons, preventing users from inadvertently revoking their own access.