Outpost24 logo
Exploiting trust: Weaponizing permissive CORS configurations
Application Security
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing...
executive intelligence
Threat Context Monthly: Executive intelligence briefing for September 2024
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...
Outpost24 logo
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities
Research & Threat Intel
Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in...
Attack Surface Score - How do you compare?
What security lessons can you learn from your attack...
EASM
Increasing digitalization and connectivity mean most organizations are facing a growing attack surface. As a result, there are more IT...
Outpost24 logo
CTEM step-by-step guide | Stage one: Scoping
Digital Risk Protection
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of...