custom white shadow vectorcustom white shadow vectorcustom vectorcustom vectorcustom vector

VerifiedThreat is an AI-driven threat and vulnerability platform originally designed for governments and sovereign nations. It simulates state-sponsored red team attacks on critical infrastructure, national security assets, and enterprise systems. The VerifiedThreat Index (VTI) is an evaluation tool designed to measure the overall vulnerability level to external cybersecurity threats within the corporate sectors.

It is designed to assess 21 key criteria, from WAF & Firewall operations, to vulnerability to automated traffic, and provides companies with an overall picture of how well their perimeter defence is performing against their peers.

All results derive from non-invasive, controlled simulation activity and do not reflect active breach indicators or confirmed adversarial campaigns. Rather, they reveal the types of exposure that may be exploited through known methods such as bot-based reconnaissance, session hijacking, site impersonation, and unmitigated behavioural simulation.

This context is provided solely to inform strategic cybersecurity planning and sectoral hardening. The VerifiedThreat Index (VTI) reflects exposure-level intelligence derived from the VerifiedThreat telemetry, and real-time digital vulnerability analysis conducted during a monthly 30-day assessment window. 

The VTI index produces regional and sector aggregated threat data to measure overall performance amongst the relevant peer group. The competitive and sector context is important. Often in security, you don’t have to be the very best, but you do have to be better than your closest neighbour. Inadequately protected sites will inevitably become a focus for attackers, who are encouraged by the lack of robust protection, to launch further sophisticated attacks, with the certain knowledge the defence is proven to be weak. 

The agentic AI  runs an extremely lightweight series of risk assessments that has no impact on performance, but is nevertheless very powerful at identifying vulnerabilities. It measures the vulnerability from an outside in perspective, using Red Team simulation to identify major weak spots.

GenAI-powered services - previously limited to advanced threat actors - are now widely available through darknet marketplaces, often operated by syndicates based in Iran, North Africa, and Eastern Europe. These toolkits are enabling both state-aligned and non-state actors to launch scalable, highly automated cyber operations with minimal technical expertise. VerifiedThreat simulates these types of attacks.  If a vulnerability is discovered, the VerifiedThreat agents then go into ‘swarm mode’ - where smart agents act in concert to expose, validate and provide the evidential proof of the scale of the underlying risk. This helps to validate the real risk to prevent false positives, and also exposes the scale of the risk.

Although the exact sequence of tests isn’t disclosed to keep the VerifiedThreat Index (VTI) entirely objective, the following represents the types of attack simulation performed:

  • Vulnerability to reconnaissance based attacks using common hacker tools and platforms.
  • WAF settings / configuration testing 
  • Tests common agents in “stealth’ mode that attempt to hide their origins by rotating IP, user agents, and footprints.
  • Identifies vulnerable asset protection on login paths, APIs, payment gateways, etc.
  • Propensity for fake account creation
  • Site Cloning - for high value targets such as banks, financial portals, or major ecommerce sites, where the entire brand is cloned and data mined for access credentials made into the fake site.
  • Identifying fake search engine crawlers e.g. fake googlebot 
  • Cookie Data Integrity / propensity for cookie manipulation & hijacking
  • Overall site exposure to automated traffic
  • Mitigation bypass techniques for e.g. CAPTCHA.
  • Exposure to data mining / API abuse
  • Fingerprint / footprint client authentication and blocking
  • Overall user latency / access and performance.

What do the results actually mean?

"There is no such thing as 99% security"
Companies with a comprehensive perimeter Zero Trust policy should be gaining 100%. The suite of tests is designed so that a robust perimeter defence will block reconnaissance attacks before they can have a chance to report their vulnerability findings back to the attackers, which then results in more advanced exploitation attacks.
Excellent
100
Companies should be aiming for a perfect score. The tests don’t have deliberate “gotcha’s” to force poor scores, but instead simulate common attack methods that are widely used by attackers today, and we’d expect the best performing sites to attain a perfect score. Many sites do and we call out the best performers in each sector.
Very Good
80-99
Although a small performance gap has been identified, the site nevertheless has significant edge protection that is effective in the vast majority of cases. Robust and demonstrable edge protection is in place, which often leads to attackers searching for easier targets.
Par Score
65-79
A par performance introduces some meaningful  exposure to vulnerabilities. Although clearly not optimal, this category does have largely performing edge protection activated, which may be enough to protect it from more serious attacks.
Sub-Par
40-64
Security gaps, and failing the majority of the tests means your security is poor, and falls significantly below the best performers.The risks are starting to escalate at this level of poor performance, and life is made significantly easier for the outside-in external attackers.
Inadequate
11-39
Major gaps, and failing the majority of the tests means your security is inadequate. Often in security, you don’t have to be the very best, but you do have to be better than your closest neighbour. These sites will inevitably become a focus for attackers, who are encouraged by the lack of robust protection, to launch further sophisticated attacks, knowing the defence is weak.
Critical
0-10
Little or no protections in place. It’s the real-world equivalent of leaving the keys in the ignition. This critical category sees a disproportionate increase in major follow-up attacks.