Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
What security lessons can you learn from your attack surface score?
Blog
Increasing digitalization and connectivity mean most organizations are facing a growing attack surface. As a result, there are more IT assets to track and manage, plus more potential attack routes for threat actors to target. The threat situation is constantly evolving, especially in the area of vulnerabilities – last year...
CTEM step-by-step guide | Stage one: Scoping
Blog
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your online environment. It’s also...
Threat Context monthly: Executive intelligence briefing for August 2024
Blog
Welcome to the Threat Context monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber Threat Intelligence team. Here’s what you need to know from August. Threat actor of the month: NullBulge (Hacktivist group) "NullBulge" is a is...
CSRF simplified: A no-nonsense guide to Cross-Site Request Forgery
Blog
Cross-Site Request Forgery (CSRF) is a serious web security vulnerability that allows attackers to exploit active sessions of targeted users to perform privileged actions on their behalf. Depending on the relevancy of the action and the permissions of the targeted user, a successful CSRF attack may result in anything from...
Supercharge domain discovery with AI-powered External Attack Surface Management (EASM)
Blog
Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing your external attack surface is more crucial than ever. But with the vast number of digital assets that organizations need to monitor, accurately identifying every component of your attack surface...
How to tell if your organization’s credentials have been involved in a breach
Blog
Stolen credentials are the easiest route into your organization for a hacker. Verizon’s 2023 Data Breach Investigation Report found that threat actors used stolen credentials in 49% of attempts to gain unauthorized access to organizations. The problem IT teams face is knowing when credentials have been stolen or leaked in...
[New research] Benelux Region’s Attack Surface Security Benchmark Report
Resource > Research
Discover how your organization’s digital security compares across the Benelux region with our latest research in this free PDF whitepaper. Our comprehensive report, using advanced External Attack Surface Management (EASM) data from Outpost24, benchmarks the security landscapes of key industries — Energy, Financial Services, Healthcare, Pharma, and Transport. Gain critical...
Everything you need to know about EASM and PTaaS  — within CTEM framework
Resource > Webinar
Date: 22 August 2024 3:00 pm CEST External Attack Surface Management (EASM) and Pen Testing as a Service (PTaaS) provide valuable insights into a strong security plan to protect your organization. These tools contribute to key stages within the Continuous Threat Exposure Management (CTEM) approach, which protects your company’s networks,...
Outpost24 Launches AI Domain Discovery in External Attack Surface Management
Blog
Philadelphia, PA, July 29th, 2024 – Outpost24, a leading provider of exposure management solutions is pleased to announce the integration of a new Artificial Intelligence (AI) assistant into its Exposure Management Platform. This groundbreaking AI Domain Discovery feature enables Outpost24 customers to effortlessly identify domains belonging to their organization, significantly...
Threat group USDoD claims to leak CrowdStrike threat actor database
Blog
The threat group USDoD posted on a dark web forum on July 24th to claim they’ve got hold of a large database of threat actors compiled by CrowdStrike. So far, the threat actor has released only a small sample of the data, but the forum post below claims that over...