Three ways hackers can escalate their privileges in Windows
Cybersecurity News
Read how our red team used different attack techniques to hack AppLocker restrictions by implementing escalated privileges and reusing the...
OWASP top 10 2021: what’s new and changed
Application Security
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP...
hacker image
Outpost24 supports TIBER-EU for threat intelligence-based ethical red-teaming
Research & Threat Intel
TIBER-EU is the European framework for threat intelligence-based ethical red-teaming and the first EU-wide guide on how authorities, threat intelligence...
Sweepatic obtains the Cybersecurity Made in Europe Label from...
EASM
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This...
Reduce your ransomware attack surface with an EASM platform
EASM
Learn how an external attack surface management solution helps to reduce the chances of a ransomware infection. Many sources report...