Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Cybersecurity teams and CISOs of big organizations find it increasingly harder to understand all their internet-connected IT assets (known and unknown) that are deployed. Learn how External Attack Surface Management can help. Most CISOs would agree that knowing the full breath of your external attack surface is essential for 2...
Blog
A hacker would want to escalate their privileges in Windows to gain higher-level access, such as administrator rights, which allows them to control the system more fully. With elevated privileges, they can install malware, modify system settings, and access sensitive data. This level of access makes it easier to carry...
Blog
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP has announced the release for the new 2021 Top 10. Find out more about Broken Access Control and Cryptographic Failure vulnerabilities and understand what it means for application development and...
Blog
Thanks to its threat intelligence offering, Outpost24 is well-positioned to create attack scenarios in line with the TIBER-EU framework. These scenarios will provide in-depth insights into different adversaries and their tactics, techniques and procedures (TTPs). Threat Actor Profile of Lazarus Group in the Blueliv Threat Context module TIBER-EU tests...
Blog
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This certification recognizes European IT security companies for their reliable and trustworthy solutions. We are proud to share that Sweepatic – as the first External Attack Surface Management company – has...
Blog
What is not online cannot be hacked. In today’s digital landscape, that simple truth is more relevant than ever. As organizations expand their online presence through cloud services and third-party integrations, their attack surface grows with it. Every exposed domain, subdomain, open port, or misconfigured service becomes a potential entry...
Blog
“All World Cards” is a new underground card shop created at the end of May 2021. The card shop went quite unnoticed until it caught the attention of the cybercriminal underground and the cybersecurity industry on August 2, 2021, by making publicly available one million compromised cards totally free of...
Blog
Outpost24, an innovator in full-stack cybersecurity assessment, today announced the acquisition of Blueliv, a leading cyber threat intelligence company in Barcelona, Spain. STOCKHOLM, July 13, 2021 – Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Blueliv, a leading cyber threat intelligence company in Barcelona, Spain....
Blog
Aviva, Prudential and Allianz amongst European insurers with application security issues London 30 June, 2021 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2021 Web Application Security for Insurers Report, which analysed the web applications of the top 10 European insurance providers,...
Blog
Initial Access Brokers (IABs) are financially motivated threat actors that profit through the sale of remote access to corporate networks in underground forums, like Exploit, XSS, or Raidforums. The type of accesses offered are mostly Remote Desktop Protocol (RDP), Virtual Private Network (VPN), web shells, and remote access software tools...