Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Philadelphia, PA, January 10, 2024 - Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced the integration of credential threat intelligence into its external attack surface management solution. Powered by the Outpost24 Threat Intelligence solution, this new data integration will allow Outpost24 EASM customers to identify...
Blog
Coming into 2023, we predicted that the economic downturn would fuel sophisticated fraud, the growth of serverless workloads will increase the attack surface, and there would be more MFA bombing attacks. As we look to 2024, Outpost24's team of security experts have predicted the emerging threats that will shape the...
Blog
Googling your organization’s name will bring up all sorts of information. However, there’s more to the internet than the surface web that’s accessed through regular search engines: the deep web and the dark web. To stay ahead of potential threats and maximize incident response performance, security teams need a complete...
Blog
Building trust with customers often starts by demonstrating the right security controls. In the digital age, data security is paramount, and adherence to standards like ISO/IEC 27001, PCI DSS, and SOC 2 has become a key differentiator in the competitive market landscape. What is ISMS, and why does my organization need...
Blog
During a recent penetration test on a customer application, I noticed weird interactions between the web front-end and back-end. This would eventually turn out to be a vulnerability called HTTP request smuggling, enabled by the fact that the front-end was configured to downgrade HTTP/2 requests to HTTP/1.1. With the help...
Blog
The Malware-as-a-Service (MaaS) model, and its readily available scheme, remains to be the preferred method for emerging threat actors to carry out complex and lucrative cyberattacks. Information theft is a significant focus within the realm of MaaS, with a specialization in the acquisition and exfiltration of sensitive information from compromised...
Blog
You have kicked-off your annual application security assessment, but by the time the final report comes in, so have a bunch of new features from your developers. Since your pen test report can’t keep-up with your modern development cycles, it is now (and always) obsolete. You can check-off your compliance...
Blog
Philadelphia, PA, November 9, 2023 - Leading cyber risk management and threat intelligence provider Outpost24 today announced the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring. The new module, available as a part of the Threat Compass threat intelligence solution, provides a timely...
Blog
Broken access control, the vulnerability category consistently ranking on the OWASP Top 10 Web Application Security Risks list, poses the most significant challenge for application security right now. Over-reliance on automated solutions to tackle these challenges creates a false sense of security and could have severe implications for application owners....
Case Study
About the customer Landsbankinn (literally “the national bank”) is an Icelandic bank headquartered in Reykjavík. It is one of the largest banks in Iceland and the history of its predecessor goes back to 1885. Industry Banking Employees 1,200 Customer Since: 2014 Industry Banking Employees 1,200 Customer Since: 2014 Services Used...