Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Traffers and the growing threat against credentials
Blog
The Rising Threat of Traffers report, compiled by Outpost24’s Threat Intelligence team, KrakenLabs, provides a deep dive into the credential theft ecosystem, and encourages organizations to evaluate their security measures against these evolving threats. In recent years, the theft of credentials has evolved into a highly professionalized cybercriminal activity. The...
Outpost24 appoints Ola Burmark as new Chief Financial Officer
Blog
Outpost24 appointed Ola Burmark as the new Chief Financial Officer (CFO) for the company Outpost24, today announced it has appointed Ola Burmark as Chief Financial Officer (CFO) for the company. Ola Burmark will begin his new role in Q3 2023, replacing Jonas Alfredson, who has left the company. Mr. Burmark...
Five key takeaways from Outpost24’s Cyber Resilience Day
Blog
True to its theme ‘Cyber Resilience’, our recent cyber security gathering was able to dissect the fast-moving threat landscape with insights and information nuggets from a panel of security experts and practitioners on the shortcomings and the need for better use of threat intelligence. Here are five takeaways from the...
Account takeover vulnerability in Azure’s API Management Developer Portal
Blog
How an Account Takeover vulnerability, discovered during a routine customer engagement, became a candidate for responsible disclosure, via the Microsoft Security Research Center Researcher Portal. In December 2022, when testing a customer’s instance of the Azure API Management (APIM) Developer Portal, I discovered a critical vulnerability, that allowed any user...
Responsible disclosure: access control vulnerability discovered in the ThingsBoard IoT platform
Blog
On December 2022, a security researcher from the Outpost24 Ghost Labs team discovered a vulnerability on the ThingsBoard IoT platform, where a normal user’s privileges can be escalated, by doing a simple post with an additional header, and exploiting the associated flaws, to take control over the entire platform and...
How to find and fix jQuery vulnerabilities
Blog
Using an outdated jQuery library can open up your web application to vulnerabilities. Read more to find out how to find and fix jQuery vulnerabilities. jQuery is among the oldest JavaScript libraries available online. It simplifies your coding and is used by countless websites. But there is an inherent danger...
Ransomware Report 2023: targets, motives, and trends
Blog
Our annual Ransomware Report shares the latest trends and developments of the most active threat groups to help businesses better protect themselves Introduction The prevalence of ransomware attacks reached unprecedented levels in 2022. After closely monitoring the most active ransomware groups in the last year, the KrakenLabs research team at...
Cyber Threat Landscape Study 2023: Outpost24’s honeypot findings from over 42 million attacks
Blog
What are the most common cybersecurity threats facing your business? The 2023 Cyber Threat Landscape Study provides valuable threat intelligence to help you implement the appropriate security measures against real threats. The Outpost24 research team is sharing the results of the attack data from a network of honeypots deployed to...
A pen tester’s guide to Content Security Policy
Blog
In this article, we’ll look at Content Security Policy (CSP) through the eyes of a penetration tester. We will outline the advantages of CSP, explain why you should have it on your site, and share some common misconfigurations that can be exploited, along with the relevant bypass scenarios. What is...
Cybersecurity predictions for 2023
Blog
In light of the numerous large-scale cyberattacks witnessed in the last year, 2023 promises to be an exciting time for cybersecurity. Outpost24 experts share their thoughts on what we can expect in the new year, and how to best prepare against new threats. Remote working is dead. Long live hybrid...