What's New

Release highlights for recent CICADA IR versions. Current version: 1.51.0


1.51.0

  • Improved investigation completion workflow — clearer status progression from collection through to final report
  • Enhanced licence key security with stronger activation signatures
  • Console banner improvements for VM startup

1.50.0

Feature gating, tiered reporting & community trial

  • Tiered reporting — Investigation reports (executive summary, technical, MITRE mapping, blast radius, attack path, AI-enhanced) available at Professional tier. Compliance & legal reports (NDB, insurance, legal hold, regulatory, client exposure, executive briefing, IR playbook, post-incident review) available at Enterprise tier.
  • Community trial — 14-day free trial with download link delivered by email. No credit card required.
  • Active Directory moved to the free tier — all users can now connect to on-prem AD out of the box.
  • Source connectors and LLM providers are now gated by tier — locked features show a clear disabled state with upgrade prompts.

1.49.0

Behavioral engine hardening

  • Major accuracy improvements to the deterministic behavioral scoring engine — fewer false positives from service accounts, SYSTEM log operations, and correlated weak signals.
  • PowerShell deobfuscation — detects encoded commands, backtick escapes, and character array obfuscation before pattern matching.
  • New detection patterns: WinRM lateral movement, slow-and-low brute force, slow lateral movement campaigns.
  • Validated against a 16-scenario test suite covering true positives, false positives, and evasion techniques.

1.48.0

Ubiquiti UCG firewall integration & source selection redesign

  • Ubiquiti UniFi Console Gateway integration — collect firewall logs, block/unblock IPs via CICADA-BLOCKLIST firewall group. Supports API key and session-based authentication.
  • Source selection at investigation creation — when creating a new investigation, you now choose which data sources to import upfront. No more sources appearing automatically.

1.47.0

Correlation engine & detection coverage expansion

  • Correlation engine — individual detections now aggregate into entity-level correlated findings. Risk-based alerting escalates severity when multiple MITRE tactics are observed for the same entity.
  • 12 attack chain templates — temporal sequence matching for common attack flows: credential dump → lateral movement, brute force → compromise, full kill chain, DCSync + Golden Ticket, ransomware precursors, and more.
  • 17 new Windows Event IDs — domain policy changes, Zerologon/Netlogon, LSASS dump via SilentProcessExit, PowerShell pipeline, MSSQL xp_cmdshell, BITS persistence, Credential Manager, and more.
  • Evidence Events tab — search by entity name to see all normalised evidence events where they appear as actor or target.
  • Improved Defender alert parsing — process command lines, URL evidence, and registry evidence now extracted from alerts.
  • Noise reduction — successful auth IPs no longer create spurious IOCs, SHA1/MD5 duplicates removed, system accounts filtered from blast radius.

For the full changelog including all bug fixes and technical details, contact support@cicada-ir.ai.