Today, IT and software systems of an organization or company normally consist of a variety of hard- and software and services are often provided by a mixture of own and external hosts. Within these heterogeneous and complex structures it is challenging for system administrators and maintainers to keep track of the currentness of all systems. If, for any reason, this attempt fails it will lead to an increase of vulnerabilities in the systems in use, growing the potential risk to be targeted by hackers and intruders.
To protect systems against hackers and intrusion attempts at any time, it is mandatory for system administrators to obtain an overview of the current system status and potential vulnerabilities. In the best case this task should be performed automatically by an easy-to-use and scalable analyzing software which makes available a comprehensive and clearly structured overview. In addition, it ideally suggests appropriate measures to eliminate shortcomings and vulnerabilities.
At this point cyberscan.io gets involved. cyberscan.io is a vulnerability scanner, penetration testing tool and OSINT scanner in one product. cyberscan.io identifies all IP addresses and subdomains related to a domain and scans them for open ports. Port scanning results are matched against various sources for threat analysis and detection, including but not restricted to vulnerability bulletins of all important software vendors.
Updates not installed, wrong system configurations and inadequately assigned user rights - in one word: misconfigurations - still are the main triggers to facilitate intrusion into IT systems. cyberscan.io therefore assists administrators and maintainers by providing:
Additionally, using virtualization techniques, cyberscan.io can be completely ported to any internal server to conduct system internal vulnerability detection.
Often individuals utilize the same email/password combination in different contextes, for example in their company and on a dating platform. This in mind, cyberscan.io does not only screen your system, it also searches both deepweb and darknet for publications of login data like for example user names and email addresses including related passwords and password hints which might exist. cyberscan.io reports matches of those findings with the email addresses of a domain, putting administrators and maintainers in the position to take measures against the misuse of those combinations.
Once cyberscan.io has completed a security scan, the results are supplied in multiple formats. All detected vulnerabilities (including risk classification according to CVSS) can be