Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
The Rising Threat of Traffers
Resource > Research
In recent years, the credential theft ecosystem has evolved with the increased professionalization of cybercriminal activities. This trend is exemplified through the multiplication of Initial Access Brokers (IABs), the proliferation of ransomware groups, the rise in malware families’ prices, and most importantly, the emergence of Traffers teams. Traffers are organized...
KrakenLabs’ threat actor naming conventions
Blog
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is...
National Sporting Association
Case Study
About the customer A major US sports organization responsible for running live sporting events to thousands of spectators, media, sponsors and TV audiences worldwide leverages Pwn Pulse to secure its wireless airspace, an often overlooked attack surface, at its sold-out stadium events every season. Industry Sport Customer Since: 2019 Industry...
Penetration testing vs vulnerability scanning: What’s the difference?
Blog
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this article, we will limit the scope to web applications. Vulnerability...
Outpost24 expands leadership team by appointing Brendan Hogan as Chief Strategy Officer
Blog
Outpost24, a leading innovator in cyber risk management, today announced it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company. Philadelphia, PA, April 24, 2023 - Outpost24, a leading innovator in cyber risk management, today...
Risk-based Vulnerability Management
page
Blog
page
Does HIPAA require penetration testing?
Blog
When it comes to protecting sensitive health data, most organizations know that HIPAA compliance is non-negotiable. But what exactly does compliance look like? One common question many organizations have is whether HIPAA requires penetration testing. The answer is nuanced. While HIPAA doesn’t explicitly mandate pen testing, it strongly encourages security...
Komplett Group
Case Study
About the customer Komplett is the largest online retailer providing 1,000’s of consumers and businesses with essential goods. With a total of 7 online shops and over $1 billion in revenue in 2019 they have a huge reach in the Scandinavian region. Industry Retail Customer Since: 2018 Industry Event Management...
Telefonica
Case Study
About the customer One of the world’s largest telecommunications companies, Telefónica delivers best-in-class mobile, fixed, and broadband networks, together with a highly innovative portfolio of digital solutions, to meet its clients’ needs. The company is headquartered in Madrid, Spain, and manages operations in Europe, Asia, North America, and Latin and...