Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
How to secure web apps continuously with pen testing as a service (PTaaS)
Blog
Pen testing is a valuable practice for discovering and remediating exploitable vulnerabilities in code. Legacy pen testing, however, can’t keep up with the pace of agile environments. To meet the requirements of modern applications, find out how pen testing as a service delivers faster results automatically or on demand. Your...
How to use the MITRE ATT&CK framework with threat intelligence
Blog
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations are already performing vulnerability management based on CVEs by MITRE, few have considered the powerful correlations between threat intelligence, CVEs and the ATT&CK® framework. In this blog we highlight the...
Press Release: America’s top healthcare providers run vulnerable web apps
Blog
A significant 90% of web applications used by US healthcare operators are highly susceptible to attack or vulnerability exposure - more than EU counterparts. Outpost24, an innovator in identifying and managing cybersecurity exposure, has announced results from its 2021 Web Application Security for Healthcare report, which analyzed the top 10...
Press Release: Europe’s top 10 pharma manufacturers all have vulnerable web applications
Blog
Outpost24 research reveals EU pharmaceutical companies including Valium producer, Roche Pharmaceuticals, vaccine manufacturer Sanofi and COVID-19 Vaccine creators AstraZeneca all showed web application vulnerabilities London, 9 November, 2021 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2021 Web Application Security for Healthcare report...
Outpost24 to acquire Specops, adds user security assessment for enhanced attack vector mitigation
Blog
Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a leading provider of password management and user authentication solutions headquartered in Stockholm, Sweden. STOCKHOLM, November 4, 2021 – Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a...
How EASM helps big organizations to understand and secure their external attack surface
Blog
Cybersecurity teams and CISOs of big organizations find it increasingly harder to understand all their internet-connected IT assets (known and unknown) that are deployed. Learn how External Attack Surface Management can help. Most CISOs would agree that knowing the full breath of your external attack surface is essential for 2...
Three ways hackers can escalate their privileges in Windows
Blog
A hacker would want to escalate their privileges in Windows to gain higher-level access, such as administrator rights, which allows them to control the system more fully. With elevated privileges, they can install malware, modify system settings, and access sensitive data. This level of access makes it easier to carry...
OWASP top 10 2021: what’s new and changed
Blog
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP has announced the release for the new 2021 Top 10. Find out more about Broken Access Control and Cryptographic Failure vulnerabilities and understand what it means for application development and...
Outpost24 supports TIBER-EU for threat intelligence-based ethical red-teaming
Blog
​ Thanks to its threat intelligence offering, Outpost24 is well-positioned to create attack scenarios in line with the TIBER-EU framework. These scenarios will provide in-depth insights into different adversaries and their tactics, techniques and procedures (TTPs). Threat Actor Profile of Lazarus Group in the Blueliv Threat Context module TIBER-EU tests...
Outpost24’s Sweepatic obtains the Cybersecurity Made in Europe Label from ECSO
Blog
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This certification recognizes European IT security companies for their reliable and trustworthy solutions. We are proud to share that Sweepatic – as the first External Attack Surface Management company – has...