Discovering the Trends page
The Trends page highlights vulnerabilities that are gaining attention or becoming more relevant across the threat landscape.
Instead of analysing thousands of vulnerabilities individually, the Trends page groups vulnerabilities into different trend signals, allowing you to quickly identify:
- vulnerabilities gaining visibility in the security community
- vulnerabilities becoming more risky over time
- vulnerabilities with newly observed exploit activity
- vulnerabilities flagged by intelligence sources
This helps security teams prioritise investigation and remediation based on real-world threat momentum, not just severity scores.
Understanding the different Trends views
The Trends page groups vulnerabilities into different views, each highlighting a specific signal that may indicate increasing risk or emerging exploitation. Switching between views helps you explore vulnerabilities from multiple threat intelligence perspectives.
Trending in News or Social Surfaces vulnerabilities that are actively discussed in security research, blogs, forums, or social media. High discussion activity often signals newly disclosed vulnerabilities, ongoing research, or increased attention from the security community.
Rising Risk Rating Highlights vulnerabilities where risk score has increased over time due to new intelligence or exploitability indicators. This helps identify vulnerabilities that are becoming more dangerous after initial disclosure.
CISA KEV Displays vulnerabilities listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, meaning they are confirmed to be actively exploited in the wild. These vulnerabilities are typically prioritised for remediation by security teams.
Not Published to NVD Shows vulnerabilities that have not yet been published in the National Vulnerability Database (NVD). These often originate from early intelligence sources, vendor advisories, or security research and may represent emerging threats.
Added to Cytidel Spotlight Highlights vulnerabilities flagged by Cytidel’s intelligence systems or analysts as particularly important. These may affect widely used technologies, show signs of exploitation, or present significant risk to organisations.
Rising EPSS Surfaces vulnerabilities with a significant increase in EPSS (Exploit Prediction Scoring System), indicating a growing probability of exploitation. Rising scores may reflect increased attacker interest or new exploit techniques.
New Potential Proof-of-Concept Highlights vulnerabilities for which new proof-of-concept exploit code has recently appeared. The release of PoC code can increase the likelihood of real-world exploitation.
New Potential Public Exploitation Shows vulnerabilities where new signals suggest active exploitation, such as attack reports or discussions of real-world exploitation.
Adjusting the time window
You can analyse trends across different timeframes to explore vulnerability activity over different periods.
Available time windows include:
- 24H — Detect newly emerging threats
- 48H — Monitor recent vulnerability activity
- 7D — Understand weekly threat developments
- 30D — Review longer-term vulnerability trends
Shorter timeframes highlight recent activity, while longer windows provide broader context over time.
Investigating a Vulnerability
Each entry in the Trends table represents a vulnerability and includes information such as:
- vulnerability identifier (CVE)
- affected vendor
- intelligence signals and activity levels
Selecting a vulnerability opens its detailed intelligence page, where you can explore:
- threat context
- affected vendors and products
- exploit information
- remediation guidance (for vulnerabilities included in Cytidel Spotlight)
When to Use the Trends Page
Security teams typically use the Trends page to:
- detect newly emerging vulnerabilities
- monitor rapidly evolving threat intelligence
- identify vulnerabilities moving toward exploitation
- prioritise patching based on real-world threat signals
Regularly reviewing the Trends page helps organisations stay ahead of vulnerabilities before they become widespread threats.
Updated 24 days ago
