Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Ransomware continues to be a prevalent threat to almost every modern industry after a sudden renaissance at the beginning of the COVID-19 pandemic as threat actors sought to capitalize on overwhelmed organizations and their suddenly vulnerable employees. It poses a particular danger to companies that hold sensitive data and house...
Blog
Stolen user logins and passwords pertaining to the world’s largest companies are exposed and traded by cybercriminals on the open, deep and dark web London, May 10, 2022 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2022 FTSE 100 Credential Theft Study...
Blog
Spring4Shell At the time of writing, this vulnerability has no CVE assigned and is known around the Internet as Spring4Shell, due to its similarities to the infamous Log4Shell vulnerability. This vulnerability relies on the fact that when processing the contents of a query in requests Spring Core allows access...
Blog
UK’s Linde and Johnson Matthey among companies running vulnerable web apps in Outpost24’s Attack surface benchmark for Chemical Manufacturers report Tuesday, March 29, 2022 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2022 Web Application Security for Manufacturers report for the top...
Blog
Introduction Since Russia launched a large-scale military invasion of Ukraine on February 24, 2022, many threat actors surged to carry out a wide range of cyberattacks against both sides. Some well-known threat groups have also shifted their attacks or increased their intensity to focus their efforts against Russia or Ukraine....
Blog
Pen testing is a valuable practice for discovering and remediating exploitable vulnerabilities in code. Legacy pen testing, however, can’t keep up with the pace of agile environments. To meet the requirements of modern applications, find out how pen testing as a service delivers faster results automatically or on demand. Your...
Blog
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations are already performing vulnerability management based on CVEs by MITRE, few have considered the powerful correlations between threat intelligence, CVEs and the ATT&CK® framework. In this blog we highlight the...
Blog
A significant 90% of web applications used by US healthcare operators are highly susceptible to attack or vulnerability exposure - more than EU counterparts. Outpost24, an innovator in identifying and managing cybersecurity exposure, has announced results from its 2021 Web Application Security for Healthcare report, which analyzed the top 10...
Blog
Outpost24 research reveals EU pharmaceutical companies including Valium producer, Roche Pharmaceuticals, vaccine manufacturer Sanofi and COVID-19 Vaccine creators AstraZeneca all showed web application vulnerabilities London, 9 November, 2021 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2021 Web Application Security for Healthcare report...
Blog
Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a leading provider of password management and user authentication solutions headquartered in Stockholm, Sweden. STOCKHOLM, November 4, 2021 – Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a...