Product news

2025-06-17: New features improve clarity and enhance collaboration

                                                                     Watch the release video

The Exploit Prediction Scoring System (EPSS) enhances remediation 


EPSS_june 25_product news

You can now view and filter network vulnerabilities by their EPSS score directly within the Unified Vulnerabilities view. You can either view the EPSS score of a specific vulnerability or generate a list of vulnerabilities within an EPSS score range. 

This enhancement makes it easier to prioritize remediation efforts based on the likelihood of a vulnerability being exploited in the next 30 days, helping your team focus on what matters most. Use the EPSS filter today to make more informed, risk-based decisions across your vulnerability landscape. 

Read more about how to view an EPSS score here.

Flagging potential vulnerabilities enhances efficiency 


Potential vulns with EPSS score in details_june 25_product news

Vulnerabilities with a higher likelihood of being false positives - referred to as potential vulnerabilities - are now clearly marked in the Unified Vulnerabilities view with a flag symbol. 

This visual cue helps you quickly identify findings that may require further validation, enabling more efficient prioritization and review during remediation planning. These vulnerabilities can be filtered out and saved in their own tab view.  

Read more about enabling potential vulnerabilities here.

Share filtered views for enhanced collaboration 


Shareable filtered views_june 25_product news

You can now share views with filters applied across multiple areas of Security Center, including Unified Vulnerabilities, Unified Assets, and more. Note that teams will continue to see only what they have permission to see. 

This enhancement is also integrated into the dashboard. Clicking on a widget now opens a view with filters that precisely match the widget’s scope, giving you direct access to the underlying data. This makes collaboration easier and ensures everyone is looking at the same filtered information when discussing or investigating security data. 

Read more about how to share a filtered view here.

Manage asset tags & rules via the platform API 

You can now manage asset tags and tagging rules directly through the platform API. 

This new capability enables users to automate and integrate asset classification workflows, making it easier to keep asset metadata organized and up to date at scale. 

Use the API to automate and programmatically create, update, or remove tags and rules - all without needing to navigate the user interface. 

Read more about this in the API document.

Scan authentication failures are now easier to spot 

Network, web, and policy scans that encounter authentication failures will now display this information directly in the scan status. This authentication failure is indicated by a warning triangle symbol. 

This improvement makes it easier to identify and troubleshoot failed authentications, helping you quickly resolve issues and ensure scan results are accurate. 

Check scan statuses with confidence and stay ahead of configuration issues that impact coverage. 

Read more about authenticated web scans here and authenticated network scans here.

Easier access to detection details 

You can now quickly access detection details by expanding an asset or vulnerability. See exactly how the vulnerability was detected - including the relevant port, path, or detection method - without leaving the view. 

To support faster asset identification, the IP address now appears directly beneath the asset name in listings, giving you more context at a glance. 

Clarified vulnerability titles for those found with the Device Agent 

Microsoft vulnerabilities on Device Assets related to missing patches now feature more descriptive titles when the patches apply to a single product, such as Microsoft Office or SQL Server. 

This allows you to quickly understand the context and relevance of a vulnerability. You will continue to see the existing generic naming when a patch affects multiple products. 

What this looks like 

Existing title: Microsoft Windows Multiple Vulnerabilities (KB5046612) (November 2024) 

New title: Microsoft SQL Server Multiple Vulnerabilities (KB4213212) (November 2024) 

New coverage for web vulnerabilities 

We've expanded our web vulnerability coverage with new tests to help you detect emerging threats more effectively. 

This coverage includes: 

  • Prototype Pollution in Lodash 
  • Three new WordPress XSS vulnerabilities 

These additions strengthen your ability to identify and remediate critical web application risks, keeping your environment more secure. 

Other enhancements  

  • You can now properly sort the highest severity column in the Asset Device view. 
  • We have improved unification of assets, including improved accuracy when de-unifying assets.   
  • You can now select the “Red Hat Unpatched Local Security Check” category, which you can choose to include or exclude in network scans via the scan profile. 
  • We have deprecated remediation and patch reports.