hacker image
The Russia-Ukraine crisis shakes up the cybercriminal ecosystem
Research & Threat Intel
In this article, we will highlight the most relevant threat actors and attacks that took place in late February 2022,...
How to secure web apps continuously with pen testing...
Application Security
Pen testing is a valuable practice for discovering and remediating exploitable vulnerabilities in code. Legacy pen testing, however, can’t keep...
How to use the MITRE ATT&CK framework with threat...
Vulnerability Management
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...
press-release
Press Release: America’s top healthcare providers run vulnerable web...
Press Release
A significant 90% of web applications used by US healthcare operators are highly susceptible to attack or vulnerability exposure –...
press-release
Press Release: Europe’s top 10 pharma manufacturers all have...
Press Release
Outpost24 research reveals EU pharmaceutical companies including Valium producer, Roche Pharmaceuticals, vaccine manufacturer Sanofi and COVID-19 Vaccine creators AstraZeneca all...