Skip to content
English
  • There are no suggestions because the search field is empty.

Version 2.49

Discover the latest features

Version 2.49 - 23/04/2026

This update expands your visibility into exposed credentials, accelerates remediation with irrefutable proof-of-exploit attachments, and gives you total transparency over your monthly asset testing volume.

🚀 Features

🔑 See the Unseen: Continuous Leaked Credentials Validation

Leaked credentials are a prime entry point for attackers, yet often remain hidden from standard security programs. We've introduced continuous leaked credentials validation as an exposure type. Hackian now automatically cross-references your assets against known credential leaks and surfaces confirmed exposures directly in the portal. No more manual hunting or third-party lookups, just continuous visibility allowing you to act before an attacker logs in.

📎 Act with Confidence: Downloadable Proof-of-Exploit Attachments

Remediation stalls when engineering teams lack clear evidence. To ensure your teams can act rapidly on validated risks, complex findings now include full reproduction steps and supporting evidence delivered as downloadable attachments. Everything required to reproduce, understand, and fix the vulnerability is centralized in one place, eliminating back-and-forth questions and significantly accelerating your time to remediate.

📊 Scale Intelligently: Monthly Asset Usage Tracking

Managing a dynamic attack surface requires total control and transparency. You can now track your testing volume directly within the portal with the new "Assets tested this month" metric. This gives you clear, real-time visibility into your platform utilization, ensuring you can monitor your scope and testing limits efficiently without any guesswork.

🌟 Improvements

  • Focus instantly on the exposures that matter most, as your asset list can now be sorted by risk score.
  • Easily identify the right team members with event participant names now displaying correctly when available.

🛠️ Bug Fixes

  • Maintain perfect alignment between your security and engineering workflows by resolving Jira synchronization issues that caused state delays between instances.
  • Empower your developers to fix issues on the first try by correcting a bug that occasionally hid reproduction steps and evidence in findings.

Thank you for trusting Ethiack to help you keep your attack surface visible, validated, and within your control!