Search
255 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: blackhunt – Ransomware-as-a-Service (RaaS) “blackhunt” is the threat actor behind the promotion in underground forums...
Blog
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem sensible at the time, that could have serious and unintended...
page
Proyecto: OTIOT: Sistema de Monitorización y Detección de amenazas en entornos IoT e OT Referencia proyecto: RTC-2017-6175-7 Proyecto: SecRating: Plataforma para el cálculo de ratings de ciberseguridad y gestión del ciber riesgo de proveedores Referencia proyecto: RTC-2017-6593-7 Financiados por: El Ministerio de Ciencia, Innovación y Universidades – Agencia Estatal de Investigación, y...
Case Study
About the customer Kneat Solutions, founded in Ireland more than 15 years ago, has grown into a global company with offices worldwide. Specializing in serving customers in highly regulated industries such as pharma, biotech, and medical devices, Kneat provides a versatile SaaS validation platform. This platform enables their customers to...
Blog
During a recent customer assessment, our pen testers discovered a critical vulnerability that exemplifies the importance of manual and continuous pen testing. The issue involved a feature intended for administrators, allowing them to send messages to a "broadcast" endpoint, which would then be displayed in a modal pop-up box for...
Blog
A recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on vulnerabilities in Ivanti VPNs that are currently being actively exploited by malicious actors. Ivanti VPN solutions, widely utilized for their robust security features and efficient network management capabilities, have recently been identified as containing...
Blog
Cross-Site Scripting (XSS) attacks pose a significant security threat by infiltrating an application's input fields with malicious code snippets. When users access the affected pages, this code is executed in their browsers, putting their sensitive information at risk. The malicious content injected into the web browser can take various forms,...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: Cactus Ransomware group “Cactus Group" is a ransomware group that has been active since at...
page
Thanks for reaching out about Specops Software, Outpost24’s Active Directory Password Security solution A password security expert will be in touch soon to schedule your live demonstration. With a comprehensive suite of password security solutions, including password policy with breached password protection, self-service password reset, user verification at the service...
Blog
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective to work together throughout the product lifecycle in a DevOps...