ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
outpost24 acquires sweepatic
Outpost24 acquires external attack surface management provider Sweepatic to...
Press Release
​LONDON, UK, 7 June, 2023 – Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic. Based...
smashing security
Vulnerability prediction insights from Outpost24 on Smashing Security
Vulnerability Management
Carole Theriault from Smashing Security had a sit down with John Stock, our Director of Product Management here at Outpost24....
DORA security
What is DORA? How to prepare your business for...
Compliance & Regulations
Digital resiliency is one of the financial sector’s most significant challenges today. Resiliency refers to an organization’s ability to detect,...
KrakenLabs’ threat actor naming conventions
Research & Threat Intel
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat...