Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
CTEM step-by-step guide | Stage two: Discovery
Blog
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your environment. It’s also a...
Exploiting trust: Weaponizing permissive CORS configurations
Blog
If you’re a pentester, or a consumer of application security pentest reports, you’ll probably have come across Cross-Origin Resource Sharing (CORS) and its commonly associated misconfigurations. In either case, you’ll likely have quickly dismissed the finding because it resulted in yet another “recommendation” (a vulnerability without any impact). However, if...
Threat Context Monthly: Executive intelligence briefing for September 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from September. Threat actor of the month: NoName (Ransomware) “NoName” is a ransomware group that...
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities
Blog
Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in the wild on September 2nd, 2023. Interestingly, it does not only encrypt victim's files, demanding a ransom for their release, but also steals sensitive information from the infected systems. This...
What security lessons can you learn from your attack surface score?
Blog
Increasing digitalization and connectivity mean most organizations are facing a growing attack surface. As a result, there are more IT assets to track and manage, plus more potential attack routes for threat actors to target. The threat situation is constantly evolving, especially in the area of vulnerabilities – last year...
CTEM step-by-step guide | Stage one: Scoping
Blog
Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your online environment. It’s also...
Threat Context monthly: Executive intelligence briefing for August 2024
Blog
Welcome to the Threat Context monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber Threat Intelligence team. Here’s what you need to know from August. Threat actor of the month: NullBulge (Hacktivist group) "NullBulge" is a is...
CSRF simplified: A no-nonsense guide to Cross-Site Request Forgery
Blog
Cross-Site Request Forgery (CSRF) is a serious web security vulnerability that allows attackers to exploit active sessions of targeted users to perform privileged actions on their behalf. Depending on the relevancy of the action and the permissions of the targeted user, a successful CSRF attack may result in anything from...
Supercharge domain discovery with AI-powered External Attack Surface Management (EASM)
Blog
Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing your external attack surface is more crucial than ever. But with the vast number of digital assets that organizations need to monitor, accurately identifying every component of your attack surface...
How to tell if your organization’s credentials have been involved in a breach
Blog
Stolen credentials are the easiest route into your organization for a hacker. Verizon’s 2023 Data Breach Investigation Report found that threat actors used stolen credentials in 49% of attempts to gain unauthorized access to organizations. The problem IT teams face is knowing when credentials have been stolen or leaked in...