Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
An integrated cybersecurity platform that enables organizations to continuously monitor their attack surface and proactively remediate what matters most to them Today, Outpost24 introduced its exposure management platform alongside plans for its future. The Outpost24 Exposure Management Platform is a single platform for all of the exposure management offerings Outpost24...
page
Exposure management that makes business sense Outpost24 delivers a proactive defense against targeted attacks, ensuring full visibility over an evolving attack surface. Our comprehensive solution package enables customers to prioritize their security efforts effectively, utilizing a Continuous Threat Exposure Management (CTEM) program, as recommended by Gartner. CTEM is a pragmatic,...
Blog
During some standard research as part of the Outpost24 Vulnerability Research Department, I discovered 5 vulnerabilities in Zyxel NAS devices: CVE-2024-29972 - NsaRescueAngel Backdoor Account CVE-2024-29976 - Privilege Escalation and Information Disclosure Vulnerability CVE-2024-29973 – Python Code Injection Vulnerability CVE-2024-29975 - Local Privilege Escalation Vulnerability CVE-2024-29974 – Persistent Remote Code...
Blog
What happens when your organization’s domain name expires or changes? Expired domains don’t simply disappear, and they can even become attack routes into your organization. Recent news out of Belgium has highlighted the potential danger, with hundreds of expired domain names and email addresses of government services being found available...
Blog
Threat actor of the month: UAT4356 – State-sponsored adversary UAT4356 is a state-sponsored threat actor that targets perimeter network devices in government networks globally with a clear focus on espionage. Their first activity can be traced back to November 2023, although researchers found evidence that the group was testing its capabilities as early as July 2023. So...
Blog
A major challenge for developing modern applications is ensuring their security. Penetration Testing as a Service (PTaaS) is a cloud-enabled approach that lets you proactively find and fix application vulnerabilities and protect your digital assets. A key step to using a PTaaS solution is selecting the right testing environments. This...
Blog
Using our own proprietary External Attack Surface Management (EASM) solution, Outpost24’s Sweepatic, we have conducted an attack surface analysis on the Paris 2024 Olympic Games online infrastructure. The Paris 2024 cybersecurity team have done plenty right, but we’ve also highlighted some real-life attack surface risks that have slipped through the...
Blog
Philadelphia, PA, 30th April – Outpost24, a leading provider of cyber risk management and threat intelligence solutions, is pleased to announce the launch of our bespoke application security service, DAST Expert. With this innovative offering, organizations gain access to in-depth analysis of application security scanning results, eliminating false positives and...
page
Outpost24 in the news Welcome to the Outpost24 newsroom. Read our latest stories, announcements, and media coverage. EU’s answer to CVE solves dependency issue, adds fragmentation risks CSO Spotlight stories Hackers Going for Gold at Winter Olympics: Report John P. Mello Jr., TechNewsWorld Google Chrome Extensions Steal ChatGPT Conversations—And It’s...
Blog
Philadelphia, PA, 22nd April – Outpost24, a leading provider of cyber threat exposure management solutions, is pleased to announce the addition of manual asset rescans to its External Attack Surface Management (EASM) platform. This enhancement enables EASM customers to re-check the status of recently updated assets, providing flexibility around asset...