Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Starting a security program can be challenging for some organizations, especially running a mature program across a large business. Resourcing, lack of organization, and not having a clear remediation strategy are key aspects to the failure of some programs, which can all result in severe breaches of businesses. I’ll walk...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from January. Threat actor of the month: Funksec ransomware “Funksec ransomware” is a threat...
Blog
On the crisp morning of December 13th, 2024, as the clock struck 09:59 CET, anticipation filled the air. Around the world, over 200 hackers from 100 teams were gearing up for Outpost24’s annual Capture the Flag (CTF) event, aptly named "json returns". Participants performed their final checkups, opened cans of...
Blog
Subdomain takeover is a serious risk for organizations with a large online presence (which is a lot of businesses in 2025!). A domain name is the starting point of your company’s online identity, encompassing the main and subsidiary websites—serving as the organization’s business card, storefront, and a central hub for...
Blog
We’ve asked Outpost24’s CISO, Martin Jartelius, what 2025 is likely to hold for organizations using attack surface management (ASM) tools. Here’s what Martin had to say about what he predicts for ASM in 2025, as well as some thought on how the CISOs role might change. 1. What’s going to...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from December. Threat actor of the month: Cl0p “Cl0p” is a financially motivated ransomware...
Blog
As another year comes to an end, it’s not only Santa who brings presents for those on his nice list. These days, it’s quite common for well-known firms to publish their annual roundups of the most notable events that have taken place in the cybersecurity landscape, together with predictions of...
Blog
A new role-based access control (RBAC) feature has been added to Outpost24’s external attack surface management (EASM) solution. This opens up new possibilities for Outpost24 customers, allowing them to be more granular when it comes to configuring permissions for different roles. New benefits for day-to-day users of our EASM solution...
Resource > Whitepapers
Understand IAB's criminal strategies to better protect your organization IABs are crucial players in the underground marketplace of cybercrime, facilitating access to corporate networks for the highest bidder. The experts at Outpost24's KrakenLabs have pulled back the curtain on these elusive brokers in our latest report. Understand their methods, motivations,...
Case Study
ABOUT EVARA Evara, (formally Broeders van Liefde) was founded more than 200 years ago by Petrus Jozef Triest. In Belgium the organization Evara employs 14,000 people. They manage more than 50 schools, 12 psychiatric hospitals and 13 ortho-pedagogical centers. Other activities include elderly care, addiction care, social economy and kids'...