Cyber Transparency Audit of Xcitium Backend Data – Q4 2024

9 April 2025

Transparency First
Then Trust

The world needs
more transparency
in the cybersecurity

Ensuring the protection of data and systems from potential damage is a fundamental aspect of cybersecurity. It is challenging for customers to select a product if they do not have the opportunity to verify whether the software aligns with specific standards. The multibillion-dollar endpoint cybersecurity industry is characterized by the absence of standardized policies, despite its global impact on businesses.

Endpoint security software is designed to minimize risk. A beneficial approach to ensuring user understanding of a developer’s role in mitigating risk is through transparency of the application’s functionality and the developer’s infrastructure processes. By disclosing certain statistical information, it is possible to identify and understand the strengths of a product. This strategy has the potential to address the underlying issue, leading to the elimination of all remaining gaps. Conversely, developers who opt for the more challenging approach of disclosing statistical data from end devices may encounter public criticism and oversight. However, this approach is ultimately beneficial for all companies and institutions.

In the context of business-to-business relationships, clear guidelines are essential for fostering mutual trust. The cybersecurity industry should adopt a transparency approach to bolster the trust end customers place in those responsible for their brand’s image. This approach is instrumental in fostering collective progress in the realm of cybersecurity.

What is this audit?

Definition of "Cyber Transparency Audit"

As part of the “Cyber Transparency Audit,” the testing body, in the role of the Auditor, verifies data from a cybersecurity solution provider to ensure historical compliance.

The audit is a formal evaluation of a system, organization, process, or project. The data is examined to ensure compliance with specific guidelines. The primary benefit of conducting the audit is the involvement of an external Auditor, who can meticulously assess and impartially identify areas that require enhancement.

Obtaining the “Cyber Transparency Audit – Certified” certificate by a provider means that its effectiveness regarding historical data is confirmed.

The methodology and policy are available to anyone who meets the specified criteria. Therefore, anyone is welcome to join the project as an auditor or developer.­

Security incidents in telemetry data

This report contains analyzed and anonymized telemetry data from devices protected against malicious software by a product called Xcitium Advanced. The data show a correlation between potentially malicious activity on a Windows device and confirmed malware. This is significant because unknown files on employees’ computers that have not yet been confirmed as malware can serve as a backdoor to serious threats, such as ransomware or spyware.

After reviewing the historical data, we can confirm that from September 30, 2024, to December 29, 2024, among 1,051,109 unknown 0-day files, no malware infection was recorded on systems protected by Xcitium software.

Key audit insights

The audit was prepared taking into account the following data set

  1. Devices with potentially malicious activity (virtualized files).
  2. Devices with confirmed malware status (virtualized files).
  3. The number of 0-day files classified as secure.
  4. Number of 0-day files classified as PUAs.
  5. Number of 0-day files classified as malware.
  6. Potential data leaks and active infections.

Audit summary

This section of the report offers a summary of the statistics collected from devices protected by Xcitium where potentially malicious activity has been detected in relation to confirmed malware. This activity has been linked to the uploading of a file from a device for analysis in the cloud.

The presence of unknown files on employees’ computers can pose a significant security risk, potentially leading to infections with ransomware, spyware, or other malicious software. These files may be unintentionally downloaded from the Internet, brought to the company on mobile devices, or downloaded from emails. These files can cause damage to operating systems, resulting in data loss and potential infrastructure encryption or backup deletion.

From September 30, 2024, to December 29, 2024, a total of 1,051,109 unknown 0-day files were analyzed. Not a single system infection with malware or potentially unwanted software (PUA) was detected, which could have potentially led to data leakage.

AVLab Cyber transparency audit 2024 Q4

Q4 2024 Audit Summary in Numbers

Total
audited devices

4327440

Devices with potential malicious activity

571397

Devices with malware
(in containment)

18184

Total unknown files

1041109

Total clean files

1001839

Number of files with malware status

38041

Number of files with PUA, PUP status

6799

Number of unresolved malware issues

unresolved
13

Number of infected systems

unresolved
13

Number
of data leaks

unresolved
13

Cyber Transparency Audit
of Xcitium Backend Data

guest
0 Comments
Inline Feedbacks
View all comments
\r\n <\/div>\r\n<\/div>\r\n","isUserRated":"0","version":"7.6.29","wc_post_id":"13218","isCookiesEnabled":"1","loadLastCommentId":"0","dataFilterCallbacks":[],"phraseFilters":[],"scrollSize":"32","is_email_field_required":"1","url":"https:\/\/avlab.pl\/en\/wp-admin\/admin-ajax.php","customAjaxUrl":"https:\/\/avlab.pl\/en\/wp-content\/plugins\/wpdiscuz\/utils\/ajax\/wpdiscuz-ajax.php","bubbleUpdateUrl":"https:\/\/avlab.pl\/en\/wp-json\/wpdiscuz\/v1\/update","restNonce":"211f29f351","is_rate_editable":"0","menu_icon":"https:\/\/avlab.pl\/en\/wp-content\/plugins\/wpdiscuz\/assets\/img\/plugin-icon\/wpdiscuz-svg.svg","menu_icon_hover":"https:\/\/avlab.pl\/en\/wp-content\/plugins\/wpdiscuz\/assets\/img\/plugin-icon\/wpdiscuz-svg_hover.svg"}; var wpdiscuzUCObj = {"msgConfirmDeleteComment":"Are you sure you want to delete this comment?","msgConfirmCancelSubscription":"Are you sure you want to cancel this subscription?","msgConfirmCancelFollow":"Are you sure you want to cancel this follow?","additionalTab":"0"}; -->