Third Party Risk Pulse: Credit Unions Read more →

Technical Cyber Risk Score

The most comprehensive and accurate technical intelligence.

The Black Kite Technical Rating provides easy-to-understand letter grades and defensible data details behind 20 risk categories. The non-intrusive report passively evaluates third parties, and does not touch an organization’s systems or network assets.

Request Demo

Letter Grades and Defensible Data

Black Kite follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner, converting highly technical terms into business language for executives.

Patch Management

We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc.

These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.

Application Security

We collect the contents of web applications from various Internet-wide scanners and analyze them for application-level weaknesses, such as Cross Site Request Forgery, Cross Content Mixing, and Plain Text Transmission of Sensitive Information.

The results are correlated with the MITRE CWE database to detect the severity level of each finding.

DNS Health

We generate a DNS health report from 40+ control items collected from online services like IntoDNS, Robtex, Netcraft, and HackerTarget.

Since DNS queries are recursive, it is almost impossible to detect hacker footprints from DNS servers.

Email Security

We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP ‘Verify’ vulnerabilities from online services like MxToolbox and eMailSecurityGrader.

SSL/TLS Strength

SSL/TLS configurations and vulnerabilities are provided by several third-party online services.

Black Kite results for this category come from various online SSL grading services, including Qualys SSL Labs scanner, HTBridge, and Mozilla Website Observatory.

Leaked Credentials

There are more than five billion hacked emails/passwords available on the Internet and underground forums. Black Kite identifies the leaked or hacked emails and passwords.

IP/Domain Reputation

An Asset reputation score is based on the number of IPs or domains that are blacklisted or used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, and more.

Social Network

Hackers often publicize their targets or victims on social networking sites to motivate other hackers to attack the same target. The results for this category are filtered from billions of social media posts.

Hacktivist Shares

Hackers publicize their targets in underground forums or the dark web. Black Kite collects information from hundreds of dark forums, criminal sites and hacktivist sites, and filters the results for the corresponding company.

Fraudulent Domains

Fraudulent domains and subdomains are extracted from the domain registration database, which holds more than 300M records.

Fraudulent Applications

Fraudulent or pirate mobile or desktop applications are used to hack/phish employee or customer data. This category identifies possible fraudulent or pirate mobile/desktop apps on Google Play, App Store, and pirate app stores.

Digital Footprint

A digital footprint is determined by open ports, services, and application banners. This information is gathered from Black Kite crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan, and others.

Information Disclosure

Company employees often inadvertently disclose local IPs, email addresses, version numbers, and Whois privacy records, and sometimes even misconfigure a service in a way that exposes sensitive information to the internet. Black Kite identifies these potential disclosures.

Attack Surface

Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength, and any misconfigurations.

This information is gathered from Censys and Shodan databases and service/application versions are correlated with Passive Vulnerability Scan results.

Brand Monitoring

Brand monitoring is a business analytics process that monitors various channels on the web or media to gain insight about the company, brand, and anything explicitly connected to cyberspace.

Network Security

This section analyzes network-level problems and detects any critical ports, unprotected network devices, misconfigured firewalls, and service endpoints.

DDoS Resiliency

This section shows the result of 15 different potential DDoS checks and detects any potential DDoS amplification endpoints. The data is collected from non-intrusive scanners and internet-wide scanners.

Web Ranking

Cisco, Alexa and Majestic track web sites and rank them according to popularity, backlinks, and references. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results, and Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.

CDN Security

Companies use content delivery networks (CDNs) — large distributed systems of servers deployed in multiple data centers across the Internet — for online libraries like JQuery.

Black Kite analyzes the CDN content to detect possible vulnerabilities.

Website Security

This is a special analysis of a company’s main website. We collect findings related to your SSL/TLS strength, patch management, application security, web ranking and brand monitoring.

Learn more about the 20 risk categories

Vulnerability Prioritization

Black Kite® provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.

Strategy Report

Black Kite’s Strategy Report shares feedback to help executives to understand their cyber risk posture and scale return on cybersecurity investments. The report provides simple steps to help remediate issues and mitigate cyber risks with suppliers and partners.

Ticketing System

Black Kite’s ticketing system provides a paper trail for problem areas and the status of their remediation.

With the click of a button, you can share specific findings with any contact. Users can submit tickets through Black Kite’s Ticketing System, or through ServiceNow.

trusted by

Ready to get started?