Please find FortifyData's October 21st Release Notes!
Enhancements
Detailed information in the event log for domains changes:
domain name
time when that has been performed
username and company that make the changes
The event log to now include information about Portfolios including details for user that performs this activity
when a user adds a new Subsidiary in a Portfolio
when a user removes a Subsidiary from a Portfolios
All types of Threat Intelligence records are now accessible in the asset details pop-up for both Internal and External assets.
Clicking on a Threat Intelligence record containing an asset name or IP will direct the user to the relevant page and automatically apply a filter to the findings.
Vulnerability chaining for Internal, External, and Web vulnerabilities across Enterprise and Third-party systems will also be displayed in Portfolios.
Vulnerability chaining is a commonly used technique in hacker tradecraft, especially during the reconnaissance phase. As hackers map out a target’s digital footprint, they identify both direct and peripheral vulnerabilities in hardware and software, which they can exploit.
API to include a “unique ID” for each vulnerability for Infrastructure and Web application end points
Should you have any questions regarding these updates, please reach out to FortifyData or simply reply to this email.
FortifyData, 1720 Mars Hill Road, Suite 124-181, Acworth, GA 30101, United States, 888-396-4110