Skip to main content

Blog

17.Jan.2018
Simon Roe, Product Manager at Outpost24
In this final blog entry covering OWASP we will address the three new entries, what they mean for organizations and the steps they should take to mitigate the risks they pose.
04.Jan.2018
Srinivasan Jayaraman, Vulnerability Research Manager
CPU bugs Meltdown and Spectre were discovered earlier this week which could allow hackers to read sensitive information stored in a system's memory. Find out what they are and what can be done about these widespread vulnerabilities
02.Jan.2018
Simon Roe, Product Manager at Outpost24
The second part of the OWASP Top 10 2013/17 comparison list with tips and advice to remediate vulnerabilities such as sensitive data exposure, broken access controls, security misconfigurations and cross site scripting (XSS).
21.Dec.2017
Simon Roe, Product Manager at Outpost24
In December 2017 several security researchers discovered that an old vulnerability – namely the Bleichenbachers Oracle Threat had resurfaced after first being discovered 19 years ago in 1989. This recurring vulnerability, now called ROBOT, affects the TLS (Transport Layer Protocol) in a way that could lead to the disclosure of private information caused by discrepancies between valid and invalid PKCS#1 padding.
11.Dec.2017
Simon Roe, Product Manager at Outpost24
After analysing data from over 40 application security vendors, 100’s of individuals and 10,000’s of real world applications and API’s – OWASP released the new OWASP top 10 for 2017, the first major update since 2013. Four years later, what have changed?
19.Oct.2017
Simon Rawet and Kristian Varnai
Security researchers from the Outpost24 SWAT team, Simon Rawet and Kristian Varnai, have identified and reported numerous vulnerabilities in BMC Remedy. The vulnerabilities range from relatively benign to full remote code execution without authentication.
17.Nov.2016
Rafael Alfaro
A web application including authentication usually allows the user access to various types of information. By the same token, several web applications provide advanced features that are assigned through different access levels.
29.Sep.2016
Niels Schweisshelm
Imagine heading to the office on Monday morning. The company you work for has been breached during the weekend and it’s your responsibility to notify the board members. You scroll through the e-mails you received from the security engineers and it turns out that an attacker has successfully compromised the enterprise network.
02.Aug.2016
Nils Thulin
You hear about security issues and breaches so often that you have almost stopped listening to it ..until you are targeted by an attacker. It is actually not that hard to raise the bar if everyone just would do the basic security measures we would not hear so much about security issues.
27.Jul.2016
Nils Thulin
here are still serious exploits from 2010 that are not patched today...and even though solutions exists; a lot of organizations have not remediated those exploits why one should focus on Patch Management.

Looking for anything in particular?

Type your search word here