Outpost24 logo
Five strategies for uncovering vulnerabilities in web applications
Application Security
I’ve been working as an Application Security Auditor in Oupost24’s web application security testing team for almost three years now....
Outpost24 logo
How to increase cyber resilience
EASM
Making your organization’s attack surface lean and agile improves your cyber resilience and demotivates bad actors. The first step to...
Outpost24 logo
How to shield your attack surface from SSL misconfigurations
EASM
When we carry out an assessment of an organization’s attack surface, it’s often SSL (Secure Sockets Layer) misconfigurations (and other...
Outpost24 logo
Operation Magnus: Analyzing the cybercrime community reaction
Research & Threat Intel
International cooperation has become crucial to disrupt the operations of malicious cybercrime actors. A prime example of this is ‘Operation...
executive intelligence
Threat Context Monthly: Executive intelligence briefing for October 2024
Research & Threat Intel
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news...