Search

Search Results for:
255 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Threat Context Monthly: Executive intelligence briefing for March 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: blackhunt – Ransomware-as-a-Service (RaaS) “blackhunt” is the threat actor behind the promotion in underground forums...
Nine IT shortcuts that could cost you millions 
Blog
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem sensible at the time, that could have serious and unintended...
R&D Projects Spain
page
Proyecto: OTIOT: Sistema de Monitorización y Detección de amenazas en entornos IoT e OT Referencia proyecto: RTC-2017-6175-7 Proyecto: SecRating: Plataforma para el cálculo de ratings de ciberseguridad y gestión del ciber riesgo de proveedores Referencia proyecto: RTC-2017-6593-7 Financiados por: El Ministerio de Ciencia, Innovación y Universidades – Agencia Estatal de Investigación, y...
Kneat Solutions
Case Study
About the customer  Kneat Solutions, founded in Ireland more than 15 years ago, has grown into a global company with offices worldwide. Specializing in serving customers in highly regulated industries such as pharma, biotech, and medical devices, Kneat provides a versatile SaaS validation platform. This platform enables their customers to...
Unlocking admin privileges via application-wide XSS delivery  
Blog
During a recent customer assessment, our pen testers discovered a critical vulnerability that exemplifies the importance of manual and continuous pen testing. The issue involved a feature intended for administrators, allowing them to send messages to a "broadcast" endpoint, which would then be displayed in a modal pop-up box for...
Addressing the active exploitation of Ivanti VPN vulnerabilities (urgent advisory) 
Blog
A recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on vulnerabilities in Ivanti VPNs that are currently being actively exploited by malicious actors.   Ivanti VPN solutions, widely utilized for their robust security features and efficient network management capabilities, have recently been identified as containing...
Cross-site scripting attacks in action and how to protect against them
Blog
Cross-Site Scripting (XSS) attacks pose a significant security threat by infiltrating an application's input fields with malicious code snippets. When users access the affected pages, this code is executed in their browsers, putting their sensitive information at risk.  The malicious content injected into the web browser can take various forms,...
Threat Context Monthly: Executive intelligence briefing for February 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team.  Threat actor of the month: Cactus Ransomware group  “Cactus Group" is a ransomware group that has been active since at...
Confirmation Password Security Demo
page
Thanks for reaching out about Specops Software, Outpost24’s Active Directory Password Security solution A password security expert will be in touch soon to schedule your live demonstration. With a comprehensive suite of password security solutions, including password policy with breached password protection, self-service password reset, user verification at the service...
How to master pen testing in an agile environment   
Blog
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective to work together throughout the product lifecycle in a DevOps...