Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Case Study
About the customer Konings is a beverage manufacturer, focused on producing and co-packing juices, ciders, soft drinks, beers, wines, and distilled products for brands and premium private labels. The company takes care of their clients’ drinks at any stage, including the development of recipes and concepts, fruit pressing, blending, processing,...
Case Study
About Reynaers Reynaers Aluminium is a leading specialist in the development and marketing of innovative, sustainable aluminum solutions for windows, doors and façades. The manufacturer also has the sector’s largest private innovation and testing centre: The Reynaers Institute where research, product development and testing are conducted. Reynaers Aluminium is the...
Case Study
About zna Ziekenhuis Netwerk Antwerpen (ZNA) is the largest healthcare organization in Belgium. The hospital group entails 10 sites with 3 general hospitals, 7 day centers, 6 specialized hospitals, a psychiatric home and a residential care center. ZNA reaches potentially a million residents and in the city of Antwerp they...
Blog
When we carry out an assessment of an organization’s attack surface, it’s often SSL (Secure Sockets Layer) misconfigurations (and other encryption-related issues) that get the worst average scores. Research has estimated that 95% of applications have some kind of misconfiguration or vulnerability. These issues are often overlooked, but they shouldn’t...
Blog
International cooperation has become crucial to disrupt the operations of malicious cybercrime actors. A prime example of this is ‘Operation Magnus’ which has showcased the effectiveness of global collaboration in tackling sophisticated threats. By dismantling their infrastructure and exposing key players, Operation Magnus not only delivered a significant blow to...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from October. Threat actor of the month: Nitrogen, Interlock, Sarcoma & AposSecurity (Extortion groups)...
Blog
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your environment. It’s also a...
Blog
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing (CORS) and its commonly associated misconfigurations. In either case, you’ll likely have quickly dismissed the finding because it resulted in yet another “recommendation” (a vulnerability without any impact). However, if...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September. Threat actor of the month: NoName (Ransomware) “NoName” is a ransomware group that...
Blog
Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in the wild on September 2nd, 2023. Interestingly, it does not only encrypt victim's files, demanding a ransom for their release, but also steals sensitive information from the infected systems. This...