Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Security auditing web apps? Here’s your checklist for a successful pen test. 
Blog
A penetration test is a sanctioned assault on your organization’s electronic assets and data. If the attack is repelled, you win. If the attack successfully breaches your defenses, technically you also win – as you’ve now got the chance to fix those vulnerabilities before a real attacker tries their luck....
Annacon
Resource >
Outpost24 is an official partner of the second edition of ANNACON Annacon 0x7E8 takes place on Wednesday, October 23rd, 2024 in Antwerp, Belgium. ANNACON 0x7E8 is a local conference that aims to bring together experts in the cybersecurity field. It offers an excellent opportunity to network with chief information security...
Cyber Resilience Day 2024
Resource >
How To Increase the Cyber Resilience of Your Supply Chain  Join Outpost24 to understand how to increase the cyber resilience of your supply chain. Supply chain attacks remain one of the most serious threats to cybersecurity that exist today. According to the U.S. National Institute of Science and Technology (NIST),...
Threat Context Monthly: Executive intelligence briefing for March 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: blackhunt – Ransomware-as-a-Service (RaaS) “blackhunt” is the threat actor behind the promotion in underground forums...
Nine IT shortcuts that could cost you millions 
Blog
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem sensible at the time, that could have serious and unintended...
Kneat Solutions
Case Study
About the customer  Kneat Solutions, founded in Ireland more than 15 years ago, has grown into a global company with offices worldwide. Specializing in serving customers in highly regulated industries such as pharma, biotech, and medical devices, Kneat provides a versatile SaaS validation platform. This platform enables their customers to...
Unlocking admin privileges via application-wide XSS delivery  
Blog
During a recent customer assessment, our pen testers discovered a critical vulnerability that exemplifies the importance of manual and continuous pen testing. The issue involved a feature intended for administrators, allowing them to send messages to a "broadcast" endpoint, which would then be displayed in a modal pop-up box for...
Addressing the active exploitation of Ivanti VPN vulnerabilities (urgent advisory) 
Blog
A recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on vulnerabilities in Ivanti VPNs that are currently being actively exploited by malicious actors.   Ivanti VPN solutions, widely utilized for their robust security features and efficient network management capabilities, have recently been identified as containing...
Cross-site scripting (XSS): What it is and how to prevent it
Blog
Web applications are an integral part of our daily lives, used for everything from banking and shopping to social networking and business operations. However, this widespread reliance on web technology has also made it a prime target for cyberattacks. One of the most common and dangerous threats is Cross-Site Scripting...
Threat Context Monthly: Executive intelligence briefing for February 2024
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team.  Threat actor of the month: Cactus Ransomware group  “Cactus Group" is a ransomware group that has been active since at...