Three ways hackers can escalate their privileges in Windows
Cybersecurity News
Read how our red team used different attack techniques to hack AppLocker restrictions by implementing escalated privileges and reusing the...
OWASP top 10 2021: what’s new and changed
Application Security
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP...
hacker image
Outpost24 supports TIBER-EU for threat intelligence-based ethical red-teaming
Research & Threat Intel
TIBER-EU is the European framework for threat intelligence-based ethical red-teaming and the first EU-wide guide on how authorities, threat intelligence...
Outpost24’s Sweepatic obtains the Cybersecurity Made in Europe Label...
EASM
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This...
A map of interconnected city lights
How to reduce the attack surface in 5 steps
EASM
What is not online cannot be hacked. In today’s digital landscape, that simple truth is more relevant than ever. As...