Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
External Attack Surface Management
page
About Outpost24 EASM The simple onboarding process doesn’t need any software or agent installation – our external attack surface management platform is cloud-based and easily accessible through a secure login via your internet browser. We only need basic information like your company name and primary domains to get started. Discovery...
Threat Intelligence Threat Context Module
Resource > Datasheet
Prepare your perimeter against attacks with contextual intelligence around threat actors, campaigns, IOCs and more with Threat Compass.
Sibelga
Case Study
About the customer Belgian energy supplier Sibelga implemented our Attack Surface Management Platform to gain more visibility and stay ahead of cybercriminals. Industry Utilities Customer Since: 2021 Industry Event Management Software Customer Since: 2019 Services Used The Challenge for Sibelga The relevance of cybersecurity is constantly increasing in the advancing...
The Belgian National Lottery
Case Study
About the customer The Belgian National Lottery leverages the Sweepatic Platform to continuously discover and monitor their external attack surface. Industry Public Customer Since: 2020 Industry Event Management Software Customer Since: 2019 Services Used The challenge for the Belgian National Lottery Cybersecurity is key in all industries, including the Public Sector....
Electric Avenue: Overview of the Energy Sector’s Threat Landscape
Resource > Research
Our whitepaper answers some of the most relevant questions: why the energy sector is targeted, and which are the most relevant TTPs to defend against. In the document you will benefit from: An overview of the recent attacks A list of threat actors targeting the industry Blueliv intelligence to better manage your...
The Economics of Penetration Testing: Guide for Web Application Security
Resource > Whitepapers
Penetration testing is a very effective way of security testing vulnerabilities on your critical apps and can run as part of your development cycle. However, classic pen tests can sometimes cost more time and money than expected, which could cause delays in your workflow and impact the bottom line. This...
Dark Commerce: Exploring the Cybercrime Industry
Resource > Research
Download DARK COMMERCE, Outpost24’s latest report into the cybercriminal underground and its shadow economy. The report provides intelligence accessible to all levels and demonstrates the value in enriching intelligence with context to better fight adversaries. Inside the report there is information for analysts and CISOs to help: Put in place...
The Credential Theft Ecosystem
Resource > Research
81% of hacking-related breaches leverage either stolen or weak passwords, and all the security products in the world can’t protect an organization if the criminals have the right key to open the door. A good credential is the key that opens the door of your infrastructure to cybercriminals. Understanding the...
Cyber Threat Intelligence for Banking and Financial Services
Resource > Research
Banking and Financial Services organizations are high-profile targets for cybercriminal activity and subject to enormous risk. They are 300 times more likely to be targeted by an attack than any other industry and highly susceptible to data breach. They face a plethora of cyber threats including malware and ransomware with...
Everything You Need to Know about the New Taurus Stealer
Resource > Research
In this in-depth report, Alberto Marin, Outpost24’s Malware Sandbox Lead, takes a deep dive into a packed sample which the Outpost24 labs team successfully detected and classified as Taurus Stealer, a C/C++ information-stealing malware that has been in the wild since April 2020.We analyze how Taurus Stealer operates, looking at the outer layer – the packer...