Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Resource > Research
This report provides invaluable insights into the threat actors by region, the tools most commonly used, and how to mitigate against these risks as it takes a look not only at the current Coronavirus crisis, but the wider state of pharmaceutical industry’s security. We are able to monitor Emotet activity and detect the specific victim being targeted. Detailed in this latest...
Resource > Research
In today’s cybersecurity landscape prevention techniques are no longer enough. From sophisticated phishing campaigns distributing malware, to attacks on PoS, digital payment systems and customers databases retail and ecommerce companies have never experienced such a high and tangible level of risk. In this whitepaper, we detail issues facing the sector...
Resource > Research
We highlight the most common cyberthreats facing the Insurance industry and how threat intelligence can reduce risk of cyberattack. Organizations in all sectors face increasingly virulent and sophisticated cyberthreats on a weekly, if not daily basis. The insurance sector is no different and is particularly at risk due to the...
Resource > Whitepapers
Are you struggling to triage through tons of findings to identify the greatest threats and patch more effectively? You are not alone! With speed being the biggest challenge to effectively patch, this whitepaper looks at how existing prioritization works with CVSS scoring and how a risk-based approach with machine learning can...
Resource > Research
Learn more about the return of threat actor group TA505, and their dangerous RAT variant. In this in-depth report, Outpost24's KrakenLabs shares findings from the analysis of the Mirrorblast spam campaign, the last known spam operation attributed to TA505. Within the convoluted sequence of malware pieces involved in the attack,...
Blog
In today’s dynamic digital landscape, organizations are confronted with an expanding attack surface that necessitates effective risk management to protect themselves from a wide range of cyber-attacks. The complexity and volume of threats require advanced security tools that offer attack surface visibility and prioritization capabilities. By leveraging these tools, organizations can gain valuable insights into their attack surface, identify potential vulnerabilities, and prioritize risks...
Resource > Datasheet
Prepare your perimeter against attacks with contextual intelligence around threat actors, campaigns, IOCs and more with Threat Compass.
Case Study
About the customer Belgian energy supplier Sibelga implemented our Attack Surface Management Platform to gain more visibility and stay ahead of cybercriminals. Industry Utilities Customer Since: 2021 Industry Event Management Software Customer Since: 2019 Services Used The Challenge for Sibelga The relevance of cybersecurity is constantly increasing in the advancing...