impersonation-attacks
Homograph attacks: How hackers exploit look-alike domains
EASM
Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser’s...
press release
Responsible vulnerability disclosure: Why it matters
Cybersecurity News
The concept of responsible disclosure is a simple one. If you find a vulnerability, you let the affected organization or...
Blue open lock as symbol for authentification
Six authentication vulnerabilities in web applications  
Application Security
Authentication is used by most web applications. Both for letting users have access to individual accounts, but also for protecting...
Microsoft Patch Tuesday – April 2025
Patching updates
Today marks Microsoft’s Patch Tuesday for April 2025, addressing a total of 126 vulnerabilities. This is in addition to nine...
press release
Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders  
Research & Threat Intel
This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in...