Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
IT admins are responsible for maintaining the security of an organization's systems, so you would expect them to lead by example when it comes to password security. By demonstrating strong password practices, they can set a standard for others to follow and reinforce the importance of security. This also helps...
page
Outpost24 Security and Policies Anti-bribery & Anti-corruption Policy (PDF) Modern Slavery and Human Trafficking Statement (PDF) Environmental, Social, and Governance for Outpost24 Group Privacy Policy Outpost24’s Lifecycle Policy Responsible Disclosure Policy Report a Vulnerability Policy Outpost24 COVID-19 Outbreak Business Continuity Statement Supplier Code of Conduct
page
Outpost24 Terms and Conditions Outpost24´s solutions, product and services are governed by the following regional terms and conditions. If any previous framework agreement or similar covering the Services, including possible amendments, has been negotiated and signed by both parties, then those would take precedence over the Master Agreement. Master Agreement...
Blog
This month was the 20th anniversary of Patch Tuesday from Microsoft. The occasion was celebrated with a release of an impressive 104 security patches, twelve of them ranked as critical, 43% related to remote code execution risks, and three addressing zero-day vulnerabilities, meaning attackers were actively targeting the vulnerability prior...
Blog
On October 4, 2023, the curl project maintainers sent out a pre-notification that curl version 8.4.0, expected to be released on October 11 (around 06:00 UTC), will address what they denote as the most serious vulnerability in recent years. Curl is a de-facto standard in the software business when it...
Blog
Philadelphia, PA, October 4, 2023 – Outpost24, a leading innovator in cyber risk management, today announced the appointment of Allan Robertson as Chief Revenue Officer (CRO). Robertson is responsible for overseeing company-wide revenue generation and building an enhanced, integrated go-to-market approach to accelerate sales and customer growth. Robertson is an...
Blog
The infostealer malware Rhadamanthys was discovered in the last quarter of 2022. Its capabilities showed a special interest in crypto currency wallets, targeting both wallet clients installed in the victim’s machine and browser extensions. The main distribution methods observed for this threat are fake software websites promoted through Google Ads,...
Resource > Webinar
About this talk After attending this webinar, you’ll know: The numbers behind why organizations of all sizes consider removing expiry The things you need in place before even considering removing expiry Whether or not removing expiry is right for your AD environment Is this talk right for you? This discussion...
Resource > Webinar
About this talk In our rapidly evolving digital era, cybersecurity is in a constant state of flux. In this webinar our threat intelligence experts will highlight the latest threat actor trends, vulnerabilities and campaigns threatening organizations today. We will provide valuable insights into the cybercrime landscape and how to protect...
Blog
During some standard research as part of the Outpost24 Ghost Labs Vulnerability Research department, I discovered four different vulnerabilities in Nagios XI (version 5.11.1 and lower). Three of these vulnerabilities (CVE-2023-40931, CVE-2023-40933 and CVE-2023-40934) allow users, with various levels of privileges, to access database fields via SQL Injections. The data...