hacker image
Playing with GuLoader Anti-VM techniques
Research & Threat Intel
GuLoader is one of the most widely used loaders to distribute malware throughout 2020. Among the malware families distributed by...
The seven most common web application attack vectors
Application Security
Modern web applications are complex, it is often made up of many layers where potential flaws could appear making it...
artificial-intelligence
What are AI and machine learning adding to threat...
Research & Threat Intel
As with any apparently game-changing technology, the benefits and drawbacks of artificial intelligence (AI) should be qualified by an accurate...
What are security misconfigurations?
Vulnerability Management
Misconfigurations are often seen as an easy target, as it can be easy to detect on misconfigured web servers, cloud...
press-release
Spring 2020 Release: Outpost24 announces agent-based scanning to enhance...
Press Release
Agent-based scanning helps organizations automate remote vulnerability assessment and enhance long term workforce security London, UK – June 1, 2020...