russian malware
Russian-linked malware cyberattacks: what you need to know about...
Research & Threat Intel
​  These wiper attacks are designed to identify and destroy data housed on infected machines and appears to be consistent...
Evilginx & Gophish: How hackers launch phishing campaigns
Cybersecurity News
In the last phishing blog we discussed how modern phishing works on the frontend. Read on to find out how...
How phishing works and how to prevent it
Cybersecurity News
Social engineering is the art of manipulating people, so that they give up confidential information or perform an action you...
press-release
Cyber risk management platform Outpost24 joins forces with international...
Press Release
Stockholm – 13 July 2022: Outpost24 (“Outpost24” or the “Company”), a leading innovator in identifying and managing cybersecurity threats and vulnerabilities,...
How Ransomware-as-a-Service (RaaS) operations work
Research & Threat Intel
Ransomware attack is growing at an alarming rate thanks to Ransomware as a Service (RaaS) operations. Read this blog and...