Last updated 15 Feb 2023
The ASM recurrency feature automates this process to ensure that the attack surface is continuously monitored and managed. By running the ASM recurrency every week, the system can detect and respond to any new vulnerabilities or changes to the attack surface.
New export types in Vulnerability Manager
We added JSON, XLS and XLSX as new export types to the Vulnerability Manager.
Upload images in WYSWYG fields
Strikers, while reporting a Vulnerability, can add images inside the text fields so you can easily understand the descriptions without the need to open the image gallery saving you time and enhancing your experience.
False-Positive Vulnerability Status
A new Vulnerability status has been added, so you can indicate that a Vulnerability that was reported was incorrectly identified and it does not actually exist.
Add file attachments to Vulnerability
This is a feature that allows users to attach files like videos, images, PDFs, to a Vulnerability, so the Striker can give all the information they got.
Public API remake
We created a new version of our Public API with more features and better documentation so it’s easier to understand it and integrate it.
Export vulnerabilities to CSV from Vulnerability Manager
We know that you wanted to export your vulnerabilities from our platform, we heard you, so now you can export your vulnerabilities to a CSV file.
"Attack surface monitoring" is a security practice that involves continuously monitoring and analyzing an organization's systems and networks for vulnerabilities that could be exploited by attackers. This includes monitoring external-facing assets such as websites and public APIs, as well as internal assets such as servers and network infrastructure.
Now you can add all your domains to our platform and we can monitor all your attack surfaces.
New Pentest Creation - Whitebox and Greybox
Is a feature that enables you to initiate and customize Whitebox and Greybox pentesting engagements with the best user experience.
Whitebox pentesting involves testing an organization's systems and networks with full knowledge and access to the systems and networks being tested. This can include access to source code, network diagrams, and other internal information. Whitebox pentesting can be a valuable tool for organizations that want to thoroughly assess the security of their systems and networks and identify any vulnerabilities or weaknesses that could be exploited by attackers.
Greybox pentesting involves testing an organization's systems and networks with partial knowledge and access to the systems and networks being tested. This can include access to some internal information, such as network diagrams or system configurations, but not all of the information that would be available during a whitebox pentest. Greybox pentesting can provide a more realistic simulation of an attack, as it more closely reflects the level of knowledge and access that an attacker might have in a real-world scenario.
New Pentest Report
With this feature you can export all your pentesting data to a report in a PDF file, where you have all the most important information about your pentest and you can add all found vulnerabilities, reported assessment updates and a compliance checklist.
This is a feature that allows you to experiment and test our features with already defined dummy data, so you can be sure that you understand everything without the worry of changing something in your real data.
New user profile view
We heard you and care about simplifying things, so we redesigned your profile view in the platform to have only the necessary fields needed to use our platform and to improve the experience.
New Pentest Creation - Blackbox
Is a feature that enables you to initiate and customize Blackbox pentesting engagements with the best user experience.
Blackbox pentesting simulates an attack on an organization's systems and networks from the perspective of an attacker who has no prior knowledge or access to these systems and networks.
This is a feature that allows your organization to use automated tools to scan their systems and networks for vulnerabilities that could be exploited by attackers. All vulnerabilities are integrated to our Vulnerability Manager.
This is a feature that helps your organizations identify, track, and mitigate vulnerabilities within your systems. You can sort; filter by status, criticality, source and view it in kanban or list mode.
Strikers now can update you in a continuing form all the things they’ve been testing in your platform. So, besides knowing all your vulnerabilities, now you can know where your platform is correctly secured.
Second Factor Authentication
Security, yours and ours, is the most important thing in the world for us. So, now you can enable 2FA with OTP so in every new login our platform requires you to provide a second form of authentication in addition to their password when logging in to a system or service.
Continue with Google
This is a feature that allows you to quickly and easily log in or sign up to our platform using your work Google account. It simplifies this process by using our platform without a password and adding the Google security to ours.