unveiling-lummaC2
Analyzing LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for...
Research & Threat Intel
Lumma stealer’s new Anti-Sandbox technique that forces the malware to wait until “human” behavior is detected.
traditional pen testing
Can traditional pen testing keep up with modern AppSec?...
Application Security
A pen tester’s perspective on the most common issues with vulnerability scanning and traditional pen testing of modern web apps.
Outpost24 logo
Outpost24 adds Threat Explorer to threat intelligence platform for...
Press Release
Leading cyber risk management and threat intelligence provider Outpost24 today announced the release of Threat Explorer, an advanced vulnerability intelligence...
broken-access
Broken access control vulnerabilities and why scanners can’t detect...
Application Security
Examples of broken access control vulnerabilities and why they remain present even after vulnerability scans and assessments.
dc board election
DC Board of Elections breach: Voter data is now...
Research & Threat Intel
Outpost24’s KrakenLabs have found evidence of D.C. voters’ personal data being sold online. Understand the risks and how the threat...