press release
Five new vulnerabilities found in Zyxel NAS devices (including...
Research & Threat Intel
During some standard research as part of the Outpost24 Vulnerability Research Department, I discovered 5 vulnerabilities in Zyxel NAS devices:...
How to track down your expired domain names before...
EASM
What happens when your organization’s domain name expires or changes? Expired domains don’t simply disappear, and they can even become...
executive intelligence
Threat Context Monthly: Executive intelligence briefing for May 2024
Research & Threat Intel
Threat actor of the month: UAT4356 – State-sponsored adversary UAT4356 is a state-sponsored threat actor that targets perimeter network devices in government networks globally...
press release
PTaaS guide | Choosing the right test environment 
Application Security
A major challenge for developing modern applications is ensuring their security. Penetration Testing as a Service (PTaaS) is a cloud-enabled...
Paris Olympic Games wins cybersecurity silver – how does...
EASM
Using our own proprietary External Attack Surface Management (EASM) solution, Outpost24’s Sweepatic, we have conducted an attack surface analysis on...