Skip to main content

Changelog 2026-02

Updated today

[ASM] Preventing Subdomain takeover

Key changes

What is a Subdomain takeover ?

A subdomain takeover occurs when an attacker gains control over a subdomain of a target domain, typically when the subdomain has a canonical name (CNAME) or an IP address pointing to a cloud provider in the Domain Name System (DNS), but no host is providing content for it.

New Subdomain takeover checkpoints are now available, and automatically enabled, on the platform.

ℹ️ Click here to learn more about how the YWH solution works to prevent Subdomain takeover.

Impact

  • Organisations can now prevent subdomain takeover on a predefined list of cloud providers.

Audience

  • All ASM customers with Security Check enabled.

Usage

To see these new checkpoints:

  • Go to the "Admin Panel"

  • Click on "Attack Surface" in the left-side menu

  • Go to "Security Check" and look for “Subdomain takeover” checkpoints

  • The results of these checkpoints are the usual Detected Issues. They can be managed in the exact same way as CVEs and misconfigurations.


⬆️[CORE] Executive report - Closed reports table

Key changes

Previously, the executive report only covered open reports. Now, closed reports also appear in the executive report’s charts, giving organisations a more comprehensive overview of all vulnerability reports received on a program.

Impact

  • Through the updated executive report, organisations can now have a better overview of all reports they received on a program and their remediation process.

  • Thanks to these changes, organisations can now more easily communicate internally or externally about the resolution status of reports and showcase the work completed.

Audience

  • All YesWeHack customers with closed reports in their vulnerability center.

Usage

  • Export an executive report from the Vulnerability Center to access the different charts including closed reports. Example:


[CORE] "View as" from program management page

Key changes

A new button is now available in all programs, allowing organisations to switch to a hunter/pentester view and better tailor their program to the security researcher community.

Usage

  • Go to the “Admin Panel”

  • Select a program

  • Click the “View as hunter” button (“View as pentester” for pentest programs)

  • A new screen will appear displaying the hunter view of your program

  • Click on “View as manager” to go back


[MISC]

  • Hunters must complete KYC verification (i.e., be validated) before submitting a vulnerability report to a program (the Dojo program is excluded). Previously, hunters could submit a report even with a pending KYC status.

  • New invitation notifications are now available on the platform. Team members and hunters are now notified when they are invited to a program.

  • Two new buttons - “View in Vulnerability Center” and “View in Dashboard” - are now available in all programs, allowing access to the program’s reports and dashboard, respectively. New “Go to” and “View in” buttons also appear in the Attack Surface tab (e.g., “View in Vulnerability Center”).

  • [ASM] In the Admin panel > Attack Surface > Assets, find the new design of the “Actions” column:

Did this answer your question?