Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
An In-Depth analysis of the new Taurus Stealer
Blog
Introduction Taurus Stealer, also known as Taurus or Taurus Project, is a C/C++ information stealing malware that has been in the wild since April 2020. The initial attack vector usually starts with a malspam campaign that distributes a malicious attachment, although it has also been seen being delivered by the...
The use of Fast flux to hide phishing and malware delivery websites
Blog
Fast Flux is a technique that was seen for the first time in 2007 - and that is still used today -which allows attackers to resist dismantling, the ability to hide the true command and control servers, phishing sites, malware or clandestine markets, and take on possible countermeasures and censorship....
Outpost24 Appoints Tech Industry Leader Karl Thedéen as New CEO
Blog
In the year that we celebrate Outpost24’s twenty-year anniversary, we are delighted to announce the new CEO appointment London, UK - 7 April 2021 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced that its board of directors has appointed Karl Thedéen as its new Chief Executive...
What is Attack Surface Management and why is it important?  
Blog
As organizations adopt cloud services, remote work, third-party integrations, and digital transformation initiatives, their IT environments have become increasingly complex—and increasingly visible to attackers. Every exposed web server, misconfigured cloud bucket, forgotten subdomain, or unsecured API becomes a doorway that adversaries can exploit. A 2021 report revealed that 69% of organizations...
SAST, DAST, or SCA: Which is best for application security testing?
Blog
According to Verizon's 2025 Data Breach Investigations Report, there has been a 34% rise in attackers exploiting vulnerabilities to gain initial access and cause security breaches in the past year. As a result, enterprise security teams are looking more closely at how security controls can be integrated to DevOps without...
Attackers collaborate to exploit CVE-2021-21972 and CVE-2021-21973
Blog
​  CVE-2021-21972 In the first case, the less critical vulnerability CVE-2021-21973 is a Server-Side Request Forgery that can lead to information disclosure due to improper validation of URLs in a plugin. Some actors can take advantage of this if they have network access to port 443 by a POST request. This kind of vulnerability also...
The state of underground card shops in 2021
Blog
In this blog, Outpost24 analysts investigate the current card shop ecosystem, from active shops that may grow in the vacuum left by Joker’s Stash’s withdrawal as well as other recently shuttered card shops. Introduction On February 15, 2021, after nearly 6.5 years in business, the prolific card shop Joker’s Stash...
Learn how to protect yourself against COMB and future credential theft
Blog
2021 has barely begun and we have already witnessed what appears to be the biggest compilation of breached credentials in our lifetime. The Compilation of Many Breaches (COMB) was recently made available via an online forum, as broken by CyberNews, and contains over 3.2 billion credentials built up of unique pairs...
SolarWinds aftermath continues with SolarLeaks
Blog
Earlier this week a website presumably owned by the actors behind the SolarWinds breach surfaced, claiming to be selling data obtained using the SolarWinds backdoor. The site, using the domain solarleaks.net, displays only a PGP signed message, in which the actors share links to download the stolen information, which has...
Sweepatic releases GDPR cookie consent violation detection
Blog
Sweepatic, an Outpost24 product, now detects tracking cookies that are set without any user consent. Prevent a fine and address violations of the EU GDPR regulation now! Based on a list of known marketing and analytics cookies, Outpost24's EASM platform Sweepatic now detects tracking cookies that are set without any user consent....