Misconfigurations, weak settings, exposed services, CVEs. One feed.

Risk on an attack surface comes in many forms: a misconfigured DNS record, a deprecated TLS cipher, an expired certificate, an open port that shouldn't be exposed, a CVE on a fingerprinted technology version. Comprehensive Risk Detection surfaces all of them in one feed, severity-tagged and mapped to the compliance frameworks your audits care about.

WHAT THIS DOES

Detect every category of external risk on every monitored asset.

Risk detection runs across the same seven data layers that scanning operates on. Each layer surfaces its own risk categories: Whois reveals expired registrations, SSL surfaces expired or misconfigured certificates, port scan finds exposed services, HTTP catches missing security headers, web data fingerprints technology versions for CVE matching.

Every detected issue carries severity (Critical / High / Medium / Low / Info), the asset it was found on, evidence (raw scan output where applicable), and a mapping to compliance frameworks. Issues feed the unified risk score per asset and per domain.

HOW IT WORKS

Three detection categories, working in parallel.

Configuration, exposure, and vulnerability detection run on every asset in your inventory. Each category produces severity-tagged findings.

Configuration weaknesses.

Misconfigured DNS records, weak SSL/TLS settings (deprecated cipher suites, TLS 1.0/1.1 still enabled, weak DH parameters), expired or misconfigured certificates, missing security headers (HSTS, CSP, X-Frame-Options), open redirects, exposed admin interfaces.

Exposed services and infrastructure.

Open ports that shouldn't be public-facing. Default service banners revealing version information. Deprecated services running on edge infrastructure. Sensitive endpoints (admin panels, dev tools, exposed database interfaces) reachable from the public internet.

Known vulnerabilities (CVEs).

Web technology fingerprinting matched against the CVE corpus. Every CVE detected is enriched with EPSS exploit-prediction and CISA KEV "actively exploited" flags so prioritization tracks real-world exploitation, not theoretical severity.

WHAT IT SURFACES

Categories of issue you'll see in your feed.

Critical exposure

CVEs flagged in CISA KEV (actively exploited), expired SSL certificates on production assets, exposed authentication endpoints.

Configuration weakness

Deprecated TLS, weak cipher suites, missing security headers, open redirects.

Service exposure

Unintended open ports, default service banners revealing version info, exposed admin interfaces.

Vulnerability matches

CVEs detected via technology fingerprinting, ranked by EPSS + KEV signal.

Certificate hygiene

Expiring certificates (configurable warning window), wildcard exposure, certificate transparency log mismatches.

Compliance gaps

Issues mapped to the OWASP Top 10 (2021), PCI DSS 4.0 / 3.2, HIPAA, CWE, CAPEC, and WASC frameworks.

PART OF EASM

Detection feeds scoring and remediation.

Comprehensive Risk Detection sits in the middle of the EASM workflow. Continuous Scanning surfaces the raw observables; Risk Detection classifies them as issues; Remediation with Actionable Insights routes them to your team with reproduction steps and fix guidance; Complete Risk Scoring rolls them up into per-asset and per-domain risk scores. One workflow, five capabilities.

← Back to EASM

“Misconfigured DNS records and expired certificates used to fall through the cracks because they didn't fit the CVE category. Having configuration weaknesses, exposed services, and CVEs in one feed means nothing slips because of how it was classified.”

— Director of Security Operations, Financial Services Group
SEE WHAT'S DETECTED

See what risk categories are exposed on your assets.

Run Deepinfo against your domain. The free threat exposure report includes a sample of detected issues across all categories.

Request a demo