Skip to content
English
  • There are no suggestions because the search field is empty.

Version 2.46

Discover the latest features

Version 2.46 - 10/03/2026

This new release introduces significant advancements focused on enhanced visibility, streamlined compliance, and general platform improvements. Key features include the launch of Beacon v2, which offers simplified, reliable deployment and better network controls for deeper internal attack surface visibility. Furthermore, the platform introduces new compliance and security reports, specifically for PCI DSS, OWASP Top 10, and OWASP WSTG, enabling customers to translate vulnerability data directly into actionable risk management and compliance efforts. 

🚀 Features

🔦 Beacon v2: Your Light in the Darker Corners of the Attack Surface

The upgraded beacon features a simplified installation process and enhanced reliability, allowing customers to deploy faster and gain deeper, more accurate visibility into their environment. This improvement also facilitates smoother beacon lifecycle management and offers enhanced network segmentation controls, making it easier to pinpoint vulnerabilities and eliminate blind spots. Key technical features include outbound-only connectivity (eliminating the need for inbound firewall rules), automatic detection of reachable CIDRs and internal IPs, and flexible, scalable deployment options via a single script, Ansible, raw Kubernetes YAML, or a Helm chart.

undefined-Mar-10-2026-04-19-33-3219-PM

You can find a step by step guide on how to configure the new beacon at: https://support.ethiack.com/knowledge/beacon

📝 New Compliance and Security Reports: More Insight, Less Guesswork

Expand your arsenal with freshly minted report types tailored to today’s compliance and security frameworks:

  • PCI DSS Report: Effortlessly demonstrate your cardholder data environment’s security posture. Now, tracking your compliance status alongside real vulnerability data becomes seamless—and yes, auditors will love you for it.
  • OWASP Top 10 Report: Get a targeted view of your exposure against the classic web app risks. This report aligns vulnerabilities surfaced in your portal with the globally recognized OWASP Top 10, turning complex data into clear, actionable insights.
  • OWASP WSTG (Web Security Testing Guide) Report: For teams wanting thorough web application validation, this report frames your findings within the comprehensive WSTG framework. It’s like having a seasoned security consultant in report form.

Screenshot 2026-03-11 at 18.50.05

Screenshot 2026-03-11 at 18.50.47Screenshot 2026-03-11 at 18.50.32

Together, these new reports help customers translate Ethiack’s vulnerability data into meaningful compliance and risk management actions, accelerating decision-making and improving security posture visibility.

Improvements

  • Finding activity now displays names instead of just usernames, making activity logs easier to read and understand for all team members.
  • Vulnerabilities marked as deprecated no longer cause endless retesting loops, reducing noise and enabling more accurate vulnerability lifecycle tracking.
  • You can now directly search findings by their ID, speeding up navigation during incident response or audit.

🐛 Bug fixes

  • Fixed an issue that was causing finding exports to not be correctly formatted and become unusable.
  • Fixed a too restrictive permission that was preventing analysts and viewers from properly filtering findings assigned to them
  • Fixed issue preventing Hackian from being displayed as a participant in pentests where it was involved.
  • Fixed Hackers points page allowing them to keep track of their progress again

With these enhancements, Ethiack continues to sharpen your adversarial exposure validation experience, making it easier to discover, manage, and act on real vulnerabilities—right from your portal. Happy hunting!