Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
The Belgian National Lottery
Case Study
About the customer The Belgian National Lottery leverages the Sweepatic Platform to continuously discover and monitor their external attack surface. Industry Public Customer Since: 2020 Industry Event Management Software Customer Since: 2019 Services Used The challenge for the Belgian National Lottery Cybersecurity is key in all industries, including the Public Sector....
Electric Avenue: Overview of the Energy Sector’s Threat Landscape
Resource > Research
Our whitepaper answers some of the most relevant questions: why the energy sector is targeted, and which are the most relevant TTPs to defend against. In the document you will benefit from: An overview of the recent attacks A list of threat actors targeting the industry Blueliv intelligence to better manage your...
The Economics of Penetration Testing: Guide for Web Application Security
Resource > Whitepapers
Penetration testing is a very effective way of security testing vulnerabilities on your critical apps and can run as part of your development cycle. However, classic pen tests can sometimes cost more time and money than expected, which could cause delays in your workflow and impact the bottom line. This...
Dark Commerce: Exploring the Cybercrime Industry
Resource > Research
Download DARK COMMERCE, Outpost24’s latest report into the cybercriminal underground and its shadow economy. The report provides intelligence accessible to all levels and demonstrates the value in enriching intelligence with context to better fight adversaries. Inside the report there is information for analysts and CISOs to help: Put in place...
The Credential Theft Ecosystem
Resource > Research
81% of hacking-related breaches leverage either stolen or weak passwords, and all the security products in the world can’t protect an organization if the criminals have the right key to open the door. A good credential is the key that opens the door of your infrastructure to cybercriminals. Understanding the...
Cyber Threat Intelligence for Banking and Financial Services
Resource > Research
Banking and Financial Services organizations are high-profile targets for cybercriminal activity and subject to enormous risk. They are 300 times more likely to be targeted by an attack than any other industry and highly susceptible to data breach. They face a plethora of cyber threats including malware and ransomware with...
Everything You Need to Know about the New Taurus Stealer
Resource > Research
In this in-depth report, Alberto Marin, Outpost24’s Malware Sandbox Lead, takes a deep dive into a packed sample which the Outpost24 labs team successfully detected and classified as Taurus Stealer, a C/C++ information-stealing malware that has been in the wild since April 2020.We analyze how Taurus Stealer operates, looking at the outer layer – the packer...
A Buyer’s Guide to Threat Intelligence
Resource > Whitepapers
Threat intelligence has become increasingly popular among organizations struggling to defend themselves in cyberspace. When applied effectively, it can help IT teams detect and prioritize threats faster than ever before, repelling attacks in the short term and making their organization more resilient in the long-term. Whatever industry they play in,...
Everything You Need to Know about Jester Stealer
Resource > Research
Jester is a comprehensive and continuously evolving stealer, mainly focused on stealing credentials, affecting a multitude of different applications, and pays special attention to its exfiltration techniques for data theft. In this in-depth research report, we review the Jester Stealer malware code and execution flows developed and how it’s been...
Penetration Testing and Red Teaming
Resource > Datasheet
Go beyond vulnerability scanners with penetration testing services tailored to your business needs.