Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Konings
Case Study
About the customer Konings is a beverage manufacturer, focused on producing and co-packing juices, ciders, soft drinks, beers, wines, and distilled products for brands and premium private labels. The company takes care of their clients’ drinks at any stage, including the development of recipes and concepts, fruit pressing, blending, processing,...
Reynaers
Case Study
About Reynaers Reynaers Aluminium is a leading specialist in the development and marketing of innovative, sustainable aluminum solutions for windows, doors and façades. The manufacturer also has the sector’s largest private innovation and testing centre: The Reynaers Institute where research, product development and testing are conducted. Reynaers Aluminium is the...
Ziekenhuis Netwerk Antwerpen ZNA
Case Study
About zna Ziekenhuis Netwerk Antwerpen (ZNA) is the largest healthcare organization in Belgium. The hospital group entails 10 sites with 3 general hospitals, 7 day centers, 6 specialized hospitals, a psychiatric home and a residential care center. ZNA reaches potentially a million residents and in the city of Antwerp they...
How to shield your attack surface from SSL misconfigurations
Blog
When we carry out an assessment of an organization’s attack surface, it’s often SSL (Secure Sockets Layer) misconfigurations (and other encryption-related issues) that get the worst average scores. Research has estimated that 95% of applications have some kind of misconfiguration or vulnerability. These issues are often overlooked, but they shouldn’t...
Operation Magnus: Analyzing the cybercrime community reaction
Blog
International cooperation has become crucial to disrupt the operations of malicious cybercrime actors. A prime example of this is ‘Operation Magnus’ which has showcased the effectiveness of global collaboration in tackling sophisticated threats. By dismantling their infrastructure and exposing key players, Operation Magnus not only delivered a significant blow to...
Threat Context Monthly: Executive intelligence briefing for October 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from October. Threat actor of the month: Nitrogen, Interlock, Sarcoma & AposSecurity (Extortion groups)...
CTEM step-by-step guide | Stage two: Discovery
Blog
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your environment. It’s also a...
Exploiting trust: Weaponizing permissive CORS configurations
Blog
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing (CORS) and its commonly associated misconfigurations. In either case, you’ll likely have quickly dismissed the finding because it resulted in yet another “recommendation” (a vulnerability without any impact). However, if...
Threat Context Monthly: Executive intelligence briefing for September 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September. Threat actor of the month: NoName (Ransomware) “NoName” is a ransomware group that...
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities
Blog
Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in the wild on September 2nd, 2023. Interestingly, it does not only encrypt victim's files, demanding a ransom for their release, but also steals sensitive information from the infected systems. This...