Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Cyber Threat Intelligence for Pharma Sector
Resource > Research
This report provides invaluable insights into the threat actors by region, the tools most commonly used, and how to mitigate against these risks as it takes a look not only at the current Coronavirus crisis, but the wider state of pharmaceutical industry’s security. We are able to monitor Emotet activity and detect the specific victim being targeted. Detailed in this latest...
Threat Intelligence for Retail & Ecommerce
Resource > Research
In today’s cybersecurity landscape prevention techniques are no longer enough. From sophisticated phishing campaigns distributing malware, to attacks on PoS, digital payment systems and customers databases retail and ecommerce companies have never experienced such a high and tangible level of risk. In this whitepaper, we detail issues facing the sector...
Cyber Threat Intelligence for Insurance Sector
Resource > Research
We highlight the most common cyberthreats facing the Insurance industry and how threat intelligence can reduce risk of cyberattack. Organizations in all sectors face increasingly virulent and sophisticated cyberthreats on a weekly, if not daily basis. The insurance sector is no different and is particularly at risk due to the...
Predictive Risk-Based Vulnerability Management Whitepaper
Resource > Whitepapers
Are you struggling to triage through tons of findings to identify the greatest threats and patch more effectively? You are not alone! With speed being the biggest challenge to effectively patch, this whitepaper looks at how existing prioritization works with CVSS scoring and how a risk-based approach with machine learning can...
GraceWrapper: TA505’S post-exploitation enabler
Resource > Research
Learn more about the return of threat actor group TA505, and their dangerous RAT variant. In this in-depth report, Outpost24's KrakenLabs shares findings from the analysis of the Mirrorblast spam campaign, the last known spam operation attributed to TA505. Within the convoluted sequence of malware pieces involved in the attack,...
Cookie Policy
page
Cookie Policy
How to prioritize risks in the external attack surface
Blog
In today’s dynamic digital landscape, organizations are confronted with an expanding attack surface that necessitates effective risk management to protect themselves from a wide range of cyber-attacks. The complexity and volume of threats require advanced security tools that offer attack surface visibility and prioritization capabilities. By leveraging these tools, organizations can gain valuable insights into their attack surface, identify potential vulnerabilities, and prioritize risks...
External Attack Surface Management
page
Threat Intelligence Threat Context Module
Resource > Datasheet
Prepare your perimeter against attacks with contextual intelligence around threat actors, campaigns, IOCs and more with Threat Compass.
Sibelga
Case Study
About the customer Belgian energy supplier Sibelga implemented our Attack Surface Management Platform to gain more visibility and stay ahead of cybercriminals. Industry Utilities Customer Since: 2021 Industry Event Management Software Customer Since: 2019 Services Used The Challenge for Sibelga The relevance of cybersecurity is constantly increasing in the advancing...