Difference EASM vs. Vulnerability Scan vs. Pen Test
How is EASM different from vulnerability scanning and pen...
EASM
Many people wonder how an external attack surface management (EASM) solution is different from a traditional vulnerability scanner or a penetration testing exercise....
hacker image
An In-Depth analysis of the new Taurus Stealer
Research & Threat Intel
Most of the changes from earlier Taurus Stealer versions are related to the networking functionality of the malware, although other...
hacker image
The use of Fast flux to hide phishing and...
Research & Threat Intel
In this post we want to share details about a study that we have carried out on a Fast Flux...
press-release
Outpost24 Appoints Tech Industry Leader Karl Thedéen as New...
Press Release
In the year that we celebrate Outpost24’s twenty-year anniversary, we are delighted to announce the new CEO appointment London, UK...
press release
What is attack surface management and why is it...
EASM
A relatively new cybersecurity problem space with its own definition has been coined since a few years now: Attack Surface...