The Data Behind the Engine
We don't rely solely on basic port scanners. Every Cydome assessment queries enterprise-grade APIs in real-time, bringing the weight of global threat intelligence to your specific digital footprint.
Shodan API
The world's first search engine for internet-connected devices. We use Shodan to historically map your exposed services, detecting ports and devices that shouldn't be publicly facing.
Censys
Advanced host and TLS certificate analysis. Our Censys integration identifies outdated encryption protocols, expired certificates, and misconfigured infrastructure assets.
National Vulnerability Database (NVD)
Direct API syncing with the U.S. government repository of standards-based vulnerability management data. We map discovered software versions directly to CVEs.
VirusTotal
By connecting to VirusTotal, we cross-reference your IPs and domains against over 70 antivirus scanners and URL/domain blocklisting services to detect malware associations.
Exploit-DB
Knowing you have a vulnerability isn't enough; you need to know if it's weaponized. We query Exploit-DB to flag vulnerabilities that have active, public Proof-of-Concepts (PoCs) available.
SecurityTrails
Deep DNS and passive IT reconnaissance. SecurityTrails helps us map out your historical DNS records and discover forgotten subdomains (shadow IT).
Data Privacy & Architecture
Your assessment data is strictly controlled. API queries sent to our intelligence partners are isolated and do not identify your organization. Our scanning architecture strictly follows SafeComs' enterprise protocol.
All assessment reports and database records are housed in secure, isolated containers with AES-256 encryption. We comply with PDPA and GDPR data handling requirements.
Cydome operates strictly within "Safe Harbor" limits. We enumerate and probe, but we never launch exploitation payloads against your systems that could destabilize them.