Technical Cyber Risk Score
Black Kite calculates your cybersecurity risk score with the most comprehensive and accurate technical intelligence.
Letter Grades and Defensible Data
The Black Kite Technical Report provides easy-to-understand letter grades and defensible data details behind 20 risk categories. The non-intrusive report passively evaluates third-party vendors and cyber insurance subscribers, and does not touch an organization’s systems or network assets.


Black Kite follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner, converting highly technical terms into business language for executives.
Patch Management
We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc.
These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.
Application Security
We collect the contents of web applications from various Internet-wide scanners and analyze them for application-level weaknesses, such as Cross Site Request Forgery, Cross Content Mixing, and Plain Text Transmission of Sensitive Information.
The results are correlated with the MITRE CWE database to detect the severity level of each finding.
DNS Health
We generate a DNS health report from 40+ control items collected from online services like IntoDNS, Robtex, Netcraft, and HackerTarget.
Since DNS queries are recursive, it is almost impossible to detect hacker footprints from DNS servers.
Email Security
We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP ‘Verify’ vulnerabilities from online services like MxToolbox and eMailSecurityGrader.
SSL/TLS Strength
SSL/TLS configurations and vulnerabilities are provided by several third-party online services.
Black Kite results for this category come from various online SSL grading services, including Qualys SSL Labs scanner, HTBridge, and Mozilla Website Observatory.
Leaked Credentials
There are more than five billion hacked emails/passwords available on the Internet and underground forums. Black Kite identifies the leaked or hacked emails and passwords.
IP/Domain Reputation
An Asset reputation score is based on the number of IPs or domains that are blacklisted or used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, and more.
Social Network
Hackers often publicize their targets or victims on social networking sites to motivate other hackers to attack the same target. The results for this category are filtered from billions of social media posts.
Hacktivist Shares
Hackers publicize their targets in underground forums or the dark web. Black Kite collects information from hundreds of dark forums, criminal sites and hacktivist sites, and filters the results for the corresponding company.
Fraudulent Domains
Fraudulent domains and subdomains are extracted from the domain registration database, which holds more than 300M records.
Fraudulent Applications
Fraudulent or pirate mobile or desktop applications are used to hack/phish employee or customer data. This category identifies possible fraudulent or pirate mobile/desktop apps on Google Play, App Store, and pirate app stores.
Digital Footprint
A digital footprint is determined by open ports, services, and application banners. This information is gathered from Black Kite crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan, and others.
Information Disclosure
Company employees often inadvertently disclose local IPs, email addresses, version numbers, and Whois privacy records, and sometimes even misconfigure a service in a way that exposes sensitive information to the internet. Black Kite identifies these potential disclosures.
Attack Surface
Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength, and any misconfigurations.
This information is gathered from Censys and Shodan databases and service/application versions are correlated with Passive Vulnerability Scan results.
Brand Monitoring
Brand monitoring is a business analytics process that monitors various channels on the web or media to gain insight about the company, brand, and anything explicitly connected to cyberspace.
Network Security
This section analyzes network-level problems and detects any critical ports, unprotected network devices, misconfigured firewalls, and service endpoints.
DDoS Resiliency
This section shows the result of 15 different potential DDoS checks and detects any potential DDoS amplification endpoints. The data is collected from non-intrusive scanners and internet-wide scanners.
Web Ranking
Cisco, Alexa and Majestic track web sites and rank them according to popularity, backlinks, and references. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results, and Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.
CDN Security
Companies use content delivery networks (CDNs) — large distributed systems of servers deployed in multiple data centers across the Internet — for online libraries like JQuery.
Black Kite analyzes the CDN content to detect possible vulnerabilities.
Website Security
This is a special analysis of a company’s main website. We collect findings related to your SSL/TLS strength, patch management, application security, web ranking and brand monitoring.

Vulnerability Prioritization
Black Kite® provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.