Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
A penetration test is a sanctioned assault on your organization’s electronic assets and data. If the attack is repelled, you win. If the attack successfully breaches your defenses, technically you also win – as you’ve now got the chance to fix those vulnerabilities before a real attacker tries their luck....
Resource >
Outpost24 is an official partner of the second edition of ANNACON Annacon 0x7E8 takes place on Wednesday, October 23rd, 2024 in Antwerp, Belgium. ANNACON 0x7E8 is a local conference that aims to bring together experts in the cybersecurity field. It offers an excellent opportunity to network with chief information security...
Resource >
How To Increase the Cyber Resilience of Your Supply Chain Join Outpost24 to understand how to increase the cyber resilience of your supply chain. Supply chain attacks remain one of the most serious threats to cybersecurity that exist today. According to the U.S. National Institute of Science and Technology (NIST),...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: blackhunt – Ransomware-as-a-Service (RaaS) “blackhunt” is the threat actor behind the promotion in underground forums...
Blog
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem sensible at the time, that could have serious and unintended...
Case Study
About the customer Kneat Solutions, founded in Ireland more than 15 years ago, has grown into a global company with offices worldwide. Specializing in serving customers in highly regulated industries such as pharma, biotech, and medical devices, Kneat provides a versatile SaaS validation platform. This platform enables their customers to...
Blog
During a recent customer assessment, our pen testers discovered a critical vulnerability that exemplifies the importance of manual and continuous pen testing. The issue involved a feature intended for administrators, allowing them to send messages to a "broadcast" endpoint, which would then be displayed in a modal pop-up box for...
Blog
A recent advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on vulnerabilities in Ivanti VPNs that are currently being actively exploited by malicious actors. Ivanti VPN solutions, widely utilized for their robust security features and efficient network management capabilities, have recently been identified as containing...
Blog
Web applications are an integral part of our daily lives, used for everything from banking and shopping to social networking and business operations. However, this widespread reliance on web technology has also made it a prime target for cyberattacks. One of the most common and dangerous threats is Cross-Site Scripting...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news, and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Threat actor of the month: Cactus Ransomware group “Cactus Group" is a ransomware group that has been active since at...