Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: UNC5537 – Financially motivated threat actor “UNC5537” is a financially motivated threat actor that has...
Blog
AI risk and security management is unsurprisingly Gartner’s number one strategic technology trend for 2024. But you might be less familiar with number two: Continuous Threat Exposure Management (CTEM). Coined by Gartner in 2022, CTEM isn’t just another buzzy acronym – it’s a powerful process that can help continuously manage...
Blog
It had already been a challenging few weeks for Live Nation Entertainment, Inc. as they faced down a lawsuit from The Justice Department regarding anti-competitive practices. Things got worse at the end of May when a cybercriminal known as “SpidermanData” claimed to have breached a huge database of 560 million...
Blog
An integrated cybersecurity platform that enables organizations to continuously monitor their attack surface and proactively remediate what matters most to them Today, Outpost24 introduced its exposure management platform alongside plans for its future. The Outpost24 Exposure Management Platform is a single platform for all of the exposure management offerings Outpost24...
page
Thank you for reaching out about Outpost24’s Exposure Management Platform. An expert will be in touch soon to schedule your live demonstration. Need Support? Customer Support Partner Program Knowledge Base Other Top Security Solutions from Outpost24 Check Out These Related Articles
page
Exposure management that makes business sense Outpost24 delivers a proactive defense against targeted attacks, ensuring full visibility over an evolving attack surface. Our comprehensive solution package enables customers to prioritize their security efforts effectively, utilizing a Continuous Threat Exposure Management (CTEM) program, as recommended by Gartner. CTEM is a pragmatic,...
Blog
During some standard research as part of the Outpost24 Vulnerability Research Department, I discovered 5 vulnerabilities in Zyxel NAS devices: CVE-2024-29972 - NsaRescueAngel Backdoor Account CVE-2024-29976 - Privilege Escalation and Information Disclosure Vulnerability CVE-2024-29973 – Python Code Injection Vulnerability CVE-2024-29975 - Local Privilege Escalation Vulnerability CVE-2024-29974 – Persistent Remote Code...
Blog
What happens when your organization’s domain name expires or changes? Expired domains don’t simply disappear, and they can even become attack routes into your organization. Recent news out of Belgium has highlighted the potential danger, with hundreds of expired domain names and email addresses of government services being found available...
Blog
Threat actor of the month: UAT4356 – State-sponsored adversary UAT4356 is a state-sponsored threat actor that targets perimeter network devices in government networks globally with a clear focus on espionage. Their first activity can be traced back to November 2023, although researchers found evidence that the group was testing its capabilities as early as July 2023. So...