{"id":3929,"date":"2025-07-11T11:16:01","date_gmt":"2025-07-11T09:16:01","guid":{"rendered":"https:\/\/enthec.com\/?p=3929"},"modified":"2025-07-11T11:16:01","modified_gmt":"2025-07-11T09:16:01","slug":"how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/","title":{"rendered":"How to detect CVE vulnerabilities on your digital surface without touching your internal network"},"content":{"rendered":"<p><b>Detecting a threat before it&#8217;s exploited is one of the most important priorities for any organization with a digital presence today.<\/b><span style=\"font-weight: 400;\"> But how can you achieve this without compromising your internal network? Is it possible to have real visibility into your vulnerabilities without performing intrusive or invasive scans? The answer is yes, and tools like   <\/span><a href=\"https:\/\/enthec.com\/en\/kartos\/\"><span style=\"font-weight: 400;\">Kartos<\/span><\/a> <span style=\"font-weight: 400;\">by Enthec are making it possible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kartos is an advanced solution for <\/span><b>Continuous Management of Threat Exposure <\/b><span style=\"font-weight: 400;\"> (CTEM), designed specifically for businesses. It enables you to identify, prioritize, and address digital weaknesses before an attacker can exploit them as an entry point. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through an<\/span> <b>external, non-intrusive, and fully automated approach,<\/b><span style=\"font-weight: 400;\">Kartos continuously scans your digital footprint, including domains, subdomains, exposed applications, cloud assets, public configurations, and other relevant information. All without the need to install agents or access your internal network. <\/span><\/p>\n<p><b>Are you interested in learning how you can reduce your risk of cyberattacks without modifying your current infrastructure?<\/b><span style=\"font-weight: 400;\"> Discover how Kartos can help you take the next step toward a more confident and proactive posture.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is a CVE, and why should you pay attention to it?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before getting into the subject, it is essential to understand<\/span><b> what a CVE is.<\/b><span style=\"font-weight: 400;\">. The acronyms correspond to <\/span><b>Common Vulnerabilities and Exposures<\/b><span style=\"font-weight: 400;\">which stands for Common Vulnerabilities and Exposures. It&#8217;s an international standard that classifies and labels known security flaws in software and hardware. Each vulnerability is given a unique identifier, such as CVE-2024-12345, making it easier to track and resolve.  <\/span><\/p>\n<p><b>Why are they so relevant to your company?<\/b><span style=\"font-weight: 400;\"> Because when a CVE is published, cybercriminals also become aware of it. Many rely on these lists to find organizations that have not yet patched their systems or that remain publicly exposed. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">CVE and cybersecurity are terms that should always be used in conjunction. It&#8217;s not enough to know them; you have to manage them proactively. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you&#8217;d like to learn more about CVE, we recommend checking out our content:<\/span> <a href=\"https:\/\/enthec.com\/en\/what-is-a-cve\/\"><span style=\"font-weight: 400;\">What is a CVE?<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3924 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/detectar-vulnerabilidades-cve.jpg\" alt=\"Detect CVE vulnerabilities\" width=\"650\" height=\"434\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/detectar-vulnerabilidades-cve.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/detectar-vulnerabilidades-cve-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/detectar-vulnerabilidades-cve-350x234.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How are CVE vulnerabilities detected from the outside?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There is a widespread belief that detecting vulnerabilities requires performing internal scans, installing agents, or accessing the company&#8217;s network. However, this is no longer true. Thanks to modern approaches such as CTEM,   <\/span><b> you can map your entire exposure without touching a single line of your private network<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>How does the Kartos model work?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">At Enthec, we developed Kartos as a solution that simulates the vision of an external attacker. In other words, it analyzes everything exposed on the Internet that forms part of your company&#8217;s digital footprint, including IP addresses, domains, SSL certificates, web endpoints, public metadata, open configurations, and poorly protected cloud buckets. Based on this information, it detects whether any of these assets are vulnerable to known CVEs. <\/span><\/p>\n<h3><b>Correlation of assets and CVEs<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Once the exposed digital assets have been identified,<\/span> <b>Kartos cross-references them with public vulnerability databases<\/b><span style=\"font-weight: 400;\"> (such as NIST, MITRE, ExploitDB, among others) to determine if they are affected by any CVE. This process is automated and ongoing, allowing for: <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect new vulnerabilities as they are published<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Find out if any of your assets are affected<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prioritize actions based on the actual risk level<\/span><\/li>\n<li aria-level=\"1\">\n<\/li>\n<\/ul>\n<h2><b>Advantages of this approach<\/b><\/h2>\n<h3><b>No intrusions, no friction<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the most significant benefits is that it does<\/span> <b>not interfere with your internal operations. <\/b><span style=\"font-weight: 400;\">. Since it doesn&#8217;t require network permissions or software installation, implementation is quick and secure. It also reduces IT or technical department resistance, as nothing in the corporate environment is disrupted. <\/span><\/p>\n<h3><b>View from the attacker&#8217;s perspective<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A common mistake in cybersecurity is focusing solely on what happens &#8220;inside.&#8221; However, attackers don&#8217;t start inside your network: they begin outside. Having visibility into   <\/span><b>how a cyber attacker perceives you <\/b><span style=\"font-weight: 400;\">allows you to act before he does.<\/span><\/p>\n<h3><b>Smart prioritization<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Not all CVEs are equally dangerous. Some are theoretical, while others have already been discovered to have known exploits.  <\/span><b>Kartos not only detects vulnerabilities, but it also identifies the most critical ones, <\/b><span style=\"font-weight: 400;\">helping you make more efficient and informed decisions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What role does CVE play in modern cybersecurity?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Business cybersecurity in Spain and around the world is facing a growing problem: <\/span><b>the escalation of cyberattacks.<\/b><span style=\"font-weight: 400;\">. Every year, we learn of new cases that occur worldwide. In this context, reacting is no longer enough; we must anticipate. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">That&#8217;s where the concept of<\/span> <b>CVEs as a risk indicator comes in.<\/b><span style=\"font-weight: 400;\">. Knowing which CVEs affect your digital infrastructure is a crucial first step toward developing a robust defense strategy. But just as important is discovering them early and consistently. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In other words, CVE management is the foundation of an active security posture.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The CTEM approach and its application with Kartos<\/b><\/h2>\n<h3><b>What is CTEM<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CTEM, or<\/span> <b>Continuous Management of Threat Exposure,<\/b><span style=\"font-weight: 400;\">is an approach that goes beyond one-off audits. It involves continually assessing the attack surface to identify vulnerabilities and remediate them before they can be exploited. <\/span><\/p>\n<h3><b>Why Kartos stands out<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Compared to other more technical tools or those focused on internal network scans, Kartos<\/span> <b>adopts a 100% external philosophy, adapted to the real world.<\/b><span style=\"font-weight: 400;\">. It detects relevant CVEs in your visible assets, alerts you in real time, and provides concrete, actionable recommendations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, it&#8217;s scalable, enabling you to protect everything from startups to large corporations without requiring infrastructure or internal team adjustments.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What if I&#8217;m an individual? There&#8217;s a solution, too. <\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you are a self-employed professional or a user concerned about your digital footprint, Enthec has also developed <\/span><a href=\"https:\/\/enthec.com\/en\/qondar\/\"><span style=\"font-weight: 400;\">Qondar,<\/span><\/a> <span style=\"font-weight: 400;\">a solution designed for individuals.<\/span> <b>It provides visibility into your personal digital exposure, <\/b><span style=\"font-weight: 400;\">ideal for executives or professionals at risk of targeted cyberattacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CVE vulnerabilities are present in almost every connected infrastructure, and waiting for them to be exploited is a luxury no company can afford.<\/span> <a href=\"https:\/\/enthec.com\/en\/top-cybersecurity-tools-to-use-in-your-business\/\"><span style=\"font-weight: 400;\">Cybersecurity tools<\/span><\/a> <span style=\"font-weight: 400;\">like Kartos enable you to adopt a proactive and practical approach, with agile implementation, and without the need to alter your internal network through <\/span><a href=\"https:\/\/enthec.com\/en\/relevance-of-perimeter-cyber-security-for-your-business\/\"><span style=\"font-weight: 400;\">perimeter-based cybersecurity<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Detecting CVEs from the outside is not only possible, but is an increasingly recommended practice in the field of cybersecurity.<\/b><\/p>\n<p><b>Request a free Kartos demo today<\/b> <span style=\"font-weight: 400;\">and see for yourself how you can reduce your exposure to threats without changing a single line on your servers.<\/span> <a href=\"https:\/\/enthec.com\/en\/contact\/\"><span style=\"font-weight: 400;\">Contact us!<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Detecting a threat before it&#8217;s exploited is one of the most important priorities for any organization with a digital presence [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3927,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,33,38,76],"class_list":["post-3929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-risks","tag-organizations","tag-cve-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 How to detect CVE vulnerabilities | Enthec<\/title>\n<meta name=\"description\" content=\"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 How to detect CVE vulnerabilities | Enthec\" \/>\n<meta property=\"og:description\" content=\"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-11T09:16:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"How to detect CVE vulnerabilities on your digital surface without touching your internal network\",\"datePublished\":\"2025-07-11T09:16:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\"},\"wordCount\":1054,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Risks\",\"Organizations\",\"CVE\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\",\"url\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\",\"name\":\"\u25b7 How to detect CVE vulnerabilities | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg\",\"datePublished\":\"2025-07-11T09:16:01+00:00\",\"description\":\"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg\",\"width\":2560,\"height\":1578,\"caption\":\"detecci\u00f3n de vulnerabilidades CVE\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to detect CVE vulnerabilities on your digital surface without touching your internal network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 How to detect CVE vulnerabilities | Enthec","description":"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 How to detect CVE vulnerabilities | Enthec","og_description":"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity","og_url":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-07-11T09:16:01+00:00","og_image":[{"width":2560,"height":1578,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"How to detect CVE vulnerabilities on your digital surface without touching your internal network","datePublished":"2025-07-11T09:16:01+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/"},"wordCount":1054,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg","keywords":["Cybersecurity","Kartos","Risks","Organizations","CVE"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/","url":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/","name":"\u25b7 How to detect CVE vulnerabilities | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg","datePublished":"2025-07-11T09:16:01+00:00","description":"Learn how to detect CVE vulnerabilities in your company without internal scans \u2699\ufe0f Learn about this key external approach to cybersecurity","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/deteccion-vulnerabilidades-CVE-scaled.jpg","width":2560,"height":1578,"caption":"detecci\u00f3n de vulnerabilidades CVE"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/how-to-detect-cve-vulnerabilities-on-your-digital-surface-without-touching-your-internal-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to detect CVE vulnerabilities on your digital surface without touching your internal network"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3929"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3927"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}