Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
[New research] Benelux Region’s Attack Surface Security Benchmark Report
Resource > Research
Discover how your organization’s digital security compares across the Benelux region with our latest research in this free PDF whitepaper. Our comprehensive report, using advanced External Attack Surface Management (EASM) data from Outpost24, benchmarks the security landscapes of key industries — Energy, Financial Services, Healthcare, Pharma, and Transport. Gain critical...
Everything you need to know about EASM and PTaaS  — within CTEM framework
Resource > Webinar
Date: 22 August 2024 3:00 pm CEST External Attack Surface Management (EASM) and Pen Testing as a Service (PTaaS) provide valuable insights into a strong security plan to protect your organization. These tools contribute to key stages within the Continuous Threat Exposure Management (CTEM) approach, which protects your company’s networks,...
Outpost24 Launches AI Domain Discovery in External Attack Surface Management
Blog
Philadelphia, PA, July 29th, 2024 – Outpost24, a leading provider of exposure management solutions is pleased to announce the integration of a new Artificial Intelligence (AI) assistant into its Exposure Management Platform. This groundbreaking AI Domain Discovery feature enables Outpost24 customers to effortlessly identify domains belonging to their organization, significantly...
Threat group USDoD claims to leak CrowdStrike threat actor database
Blog
The threat group USDoD posted on a dark web forum on July 24th to claim they’ve got hold of a large database of threat actors compiled by CrowdStrike. So far, the threat actor has released only a small sample of the data, but the forum post below claims that over...
Cross-site scripting vulnerability found in Oracle Integration Cloud 
Blog
In November 2023, while conducting a security assessment on a client's instance of the Oracle Integration Cloud Platform, I discovered a medium severity vulnerability nestled within the handling of the “consumer_url” URL parameter. This flaw unveiled a Cross-Site Scripting (XSS) vector that could be exploited by a user with malicious...
Threat Context monthly: Executive intelligence briefing for July 2024
Blog
Every month, we bring you some of the key findings from Outpost24’s Threat Intelligence team, KrakenLabs. Here’s what you need to know from July. Threat actor of the month: Volcano demon – Ransomware group "Volcano demon" is a new ransomware group that follows the double-extortion trend and introduces a traditional...
[New research] Outpost24 report benchmarks Benelux region’s attack surface security
Blog
The Benelux region is a vibrant hub of industry and business, but it has witnessed a significant rise in cybercrime, particularly in the years following the COVID-19 pandemic. In 2022, Belgium ranked 4th in terms of cybercrime victims per million internet users and a notable percentage of the Dutch adult...
Cybersecurity Risk Management Company Outpost24 Appoints Ido Erlichman as new CEO
Blog
Also announces appointment of Niklas Savander as Chairman of the Board Outpost24, a leading provider of cyber risk management and threat intelligence solutions backed by Vitruvian Partners, today announced the appointment of Ido Erlichman as its new Chief Executive Officer, effective immediately. With over 20 years of experience in cyber...
Five key takeaways from Outpost24’s Cyber Resilience Day 2024
Blog
Held in Breda, Netherlands, this year’s Cyber Resilience Day convened industry leaders and cybersecurity experts to address the topic of supply chain attacks and the latest digital threats. The event showcased a series of keynote speeches, panel discussions, and interactive workshops, equipping attendees with valuable insights and actionable strategies to...
Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware  
Blog
While reviewing common TTPs in malware campaigns used last year Outpost24’s Cyber Threat Intelligence team, KrakenLabs, came across several reports and articles describing a novel infection technique being used to distribute various types of malware not necessarily related to each other. For example, this article analyzing Amadey and this one...