Actionable Intelligence


How FocusTags® Work in the Real World

What Are FocusTags®?

A FocusTag® links a global threat to a specific vendor's asset-level exposure. It signals that a vulnerability is discoverable, exploitable, and impacts your supply chain. A FocusTag® is not another score. It is a signal to act.

FocusTags® cover four categories of risk events:

Data Breach Tags

Ransomware Tags

High-Profile Cyber Event Tags

KEV Tags

Each tag is assigned only when a vulnerability clears strict discoverability and exploitability thresholds, ensuring that what reaches your team is signal, not noise.

Why FocusTags® Matter

Traditional TPRM has long relied on vendors to self-report vulnerabilities and incidents. FocusTags® eliminate that dependency. Rather than asking a vendor "Are you affected?", FocusTags® allow you to say: "We've identified a high-risk vulnerability on your systems. Here is the evidence, and here are the steps to remediate it." That shift — from question to assertion, from reactive to declarative — is what makes FocusTags® operationally different from a rating or score.

2025 FocusTag Summary

In 2025, the Black Kite Research Group applied 158 FocusTags covering more than 329 related Common Vulnerabilities and Exposures (CVEs). To ensure actionable precision, each tag is categorized by confidence level: Very High (50), High (93), and Medium (15).

From CVEs Analyzed to FocusTags Applied: Monthly Breakdown (2025)

CVEs with Applied FocusTags

Speed: FocusTag Release vs. Exploitation Timeline

In modern Third-Party Cyber Risk Management (TPCRM), time is the ultimate metric. Relying solely on the CISA Known Exploited Vulnerabilities (KEV) catalog means reacting to threats that are already compromising networks. Black Kite’s intelligence provides a measurable head start.

FocusTag Release Time vs. Exploitation Timeline

In 2025, Black Kite applied a FocusTag for 95.2% of OSINT-discoverable vulnerabilities before they were added to the KEV or within 24 hours of their addition to KEV. This proactive approach gives organizations a head start, allowing them to mitigate risks before vulnerabilities are widely exploited. of FocusTags were applied before or on the day of KEV addition, or within 24 hours of their inclusion. For organizations utilizing this intelligence, the implication is clear. You gain advance warning to secure your perimeter and mandate vendor remediation long before a vulnerability becomes a globally recognized crisis.

Accuracy: Beyond CVSS and EPSS

Relying exclusively on standard scoring systems leaves blind spots. The Black Kite Research Group routinely tagged CVEs even when their initial CVSS was rated medium, or when their initial EPSS score was low, because real-world threat actor interest indicated an imminent escalation. Accuracy is achieved by tracking multiple dynamic attributes rather than static scores.

The Four Signals Behind Every FocusTag®

Community/underground mentions

Public PoC availability

Observed threat actor exploitation

KEV catalog inclusion

Transparency: Confidence Levels

Confidence levels help Third-Party Cyber Risk Management (TPCRM) teams calibrate their response strategies, because not all exposure carries the same degree of certainty.

FocusTag® confidence differs from individual CVE confidence, as a single tag often covers multiple related CVEs. The Black Kite Research Group assigns these levels using AI-powered automation to collect intelligence, combined with rigorous human researcher validation. When standard Open-Source Intelligence (OSINT) techniques do not suffice, our vulnerability researchers identify special digital signatures to definitively detect exposed versions.

The final confidence level is assigned by evaluating three distinct inputs:

Version Depth

Compares how much version detail Black Kite can see via OSINT against the exact depth required to identify the vulnerable iteration.

Configuration Dependency

Assesses whether exploitation requires a non-default setup.

Access Requirement

Determines if the attacker needs prior system access to execute the exploit.

If exploitation requires specific, non-default configurations or prior system access, the overall confidence level is automatically lowered. Based on these combined inputs, FocusTags are categorized into three action-oriented levels:

  • Very High:
    • Evidence: The vulnerable version is directly confirmed via OSINT.
    • Action: Initiate immediate vendor outreach.
  • High:
    • Evidence: The product is definitively identified, most deployed versions are vulnerable, and there are no restrictive configuration or access requirements.
    • Action: Prioritize the vendor in the next assessment cycle.
  • Medium:
    • Evidence: The product is identified but version confirmation is limited, or exploitation requires a specific configuration or prior system access.
    • Action: Monitor the situation and confirm exposure before engaging.

FocusTag® Confidence Levels: Quick Reference

Medium

Product identified, subset vulnerable

Monitor, confirm

High

Product identified, most versions vulnerable

Prioritize next cycle

Very High

Vulnerable version confirmed

Immediate outreach

Confidence Level Distribution of FocusTags in 2025

This intelligence-driven methodology revealed a highly volatile threat landscape in 2025, punctuated by a significant surge in high-priority vulnerabilities during the second half of the year. September (19), October (28), November (15), and December (19) all demonstrated elevated activity. October marked the absolute peak for the year, demonstrating the critical need for automated, high-confidence alerts to cut through sudden spikes in supply chain risk.

Product and Vendor Concentration

Mapping the 2025 FocusTags reveals exactly where attackers are finding success. The top product clusters targeted by high-priority, discoverable vulnerabilities heavily involve infrastructure and edge devices:

Microsoft

F5

Ivanti

Tridium

OT/ICS

SonicWall

of total

Long Tail

(Others)

A critical emerging trend is the appearance of Operational Technology (OT) and Industrial Control System (ICS) products, notably Tridium and Sauter AG, proving that supply chain risk is rapidly extending into physical infrastructure. Despite major vendor dominance, 36.7% of tagged risk lies in the Long Tail (niche products and smaller vendors).

FocusTags identify the exposure. The next step is getting vendors to act.

The next section outlines how to transform intelligence into remediation through targeted vendor engagement.

PREVIOUS
NEXT