How to prioritise vulnerabilities with Recon

Security teams often need to evaluate large numbers of vulnerabilities at once. Recon’s Bulk Analyser helps you quickly analyse and prioritise multiple CVEs based on real-world threat intelligence.

By uploading a list of vulnerabilities, Recon generates a report that highlights which vulnerabilities are most likely to pose a risk to your organisation.

Using the Bulk Analyser

The Bulk Analyser allows you to submit a list of CVEs and analyse them in a single workflow.

To start an analysis:

  1. Navigate to Tools in Recon.
  2. Open the Bulk Analyser.
  3. Upload or paste a list of CVE identifiers.
  4. Start the analysis.

Recon will automatically evaluate each vulnerability using Cytidel’s intelligence signals and risk indicators.  

Saving and accessing reports

Bulk Analyser reports can be saved for later review. After generating a report, you can:

  • Name and save the report
  • Revisit it from the Bulk Analyser dashboard
  • Refresh the report with the latest intelligence

Updating a report ensures you always have access to the most recent threat intelligence associated with your vulnerabilities.

Using Recon for vulnerability prioritisation

Recon helps security teams move beyond static vulnerability scoring by incorporating real-world threat intelligence.

By analysing vulnerabilities in bulk, you can:

  • Identify vulnerabilities with active or emerging exploitation
  • Prioritise remediation based on threat activity and risk signals
  • Focus resources on vulnerabilities most likely to impact your organisation

This enables teams to prioritise vulnerabilities based on actual threat relevance, rather than severity scores alone.