IONIX dashboard showing ACME Inc.'s security posture as of January 15th, 2024, with 6,117 discovered organizational assets, 4,086 in the digital supply chain, 33,990 connections, and 85 potentially unknown; remediation shows 1,297 action items, including 13 critical, 238 high, 706 medium, and 340 low, along with 6 protected connections.

SCAN REPORT COVERAGE AREAS

Internal Org Assets

Assets hosted in the organizational network (in their on-premise data centers or controlled cloud environments)

External Org Assets

Assets hosted outside of the organizational network (hosting providers, non-controlled cloud environments and others)

Digital Supply Chain

Assets that the organization relies on, but does not own (Mail or DNS servers, Script Inclusion, APIs or others)

Network security visualization showing 5 open FTP services and 6 open SSH services vulnerable to brute force attacks, 6 hijackable assets, and 16 risky dependencies on exploitable assets within a digital supply chain.
Security assessment report showing types of findings (discovery, action item, assessment), severities (critical, high, medium, low, informational), and shapes used to represent the findings (general highlight, number of findings).

Threat Report Highlights

  • Highlights
    Details
    Type
    Operated by
  • Digital supply-chain risk
    16 risky dependencies on exploitable assets were detected
    Action Items
    Digital Supply Chain
  • Hijackable assets
    6 assets could be hijacked via dependency on 3rd party asset
    Action Items
    External / Digital Supply Chain
  • Protected assets
    IONIX applied Active Protection on 7 organizational assets to mitigate digital supply-chain vulnerability
    Protected Assets
    External / Digital Supply Chain
  • Potentially unknown assets
    11 misconfigured, potentially unknown, assets were detected in organizational networks
    Discovery
    Internal Organization
  • Potentially unknown assets
    74 misconfigured, potentially unknown, assets that are externally hosted
    Discovery
    External Organization
  • Misconfigured login pages
    11 externally hosted login pages are misconfigured and sending data insecurely
    Discovery
    External Organization
  • Potential employee's compromised device
    321 potential incidents of employee's compromised device
    Cyber Threat Intelligence
    Internal / External Org Assets
  • Open SSH Services
    6 open SSH services that are vulnerable to bruteforce attacks were detected in organizational networks
    Assessment
    Internal Organization
  • Open FTP Services
    5 open FTP services that are vulnerable to bruteforce attack were detected in organizational networks
    Assessment
    Internal Organization
  • Open Network services
    37 externally hosted domains expose network a service that is vulnerable to bruteforce attack
    Assessment
    External Organization
  • Exploitable CVEs (medium urgency)
    An exploitable CVE with medium urgency in externally hosted asset
    Action Items
    External Organization
  • Dev assets
    24 dev assets were detected in organizational networks
    Discovery
    Internal Organization
  • Dev assets
    85 externally hosted dev assets were detected
    Discovery
    External Organization
  • Login pages
    34 self-hosted login pages
    Assessment
    Internal Organization
  • Login pages
    226 externally hosted login pages
    Assessment
    External Organization
  • Digital supply-chain mail servers
    76 digital supply-chain mailservers are used by organizational assets
    Discovery
    Digital Supply Chain
  • Digital supply-chain script sources
    Organizational assets load code from 225 digital supply-chain assets
    Discovery
    Digital Supply Chain

Discover the full extent of your online exposure with our customized Threat Exposure Report.

Top exposure examples

Digital supply-chain risk

16 risky dependencies on exploitable assets were detected

Hijackable assets

6 assets could be hijacked via a dependency on 3rd party asset

Open FTP Services

5 open FTP services that are vulnerable to bruteforce attack were detected in the organizational networks

Open SSH Services

6 open SSH services that are vulnerable to bruteforce attack were detected in the organizational networks

Get a free Threat Exposure Report to understand the specific risks and potential exposures in your complete attack surface.

[FORM: #form]