Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Pen testing is a valuable practice for discovering and remediating exploitable vulnerabilities in code. Legacy pen testing, however, can’t keep up with the pace of agile environments. To meet the requirements of modern applications, find out how pen testing as a service delivers faster results automatically or on demand. Your...
Blog
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations are already performing vulnerability management based on CVEs by MITRE, few have considered the powerful correlations between threat intelligence, CVEs and the ATT&CK® framework. In this blog we highlight the...
Blog
A significant 90% of web applications used by US healthcare operators are highly susceptible to attack or vulnerability exposure - more than EU counterparts. Outpost24, an innovator in identifying and managing cybersecurity exposure, has announced results from its 2021 Web Application Security for Healthcare report, which analyzed the top 10...
Blog
Outpost24 research reveals EU pharmaceutical companies including Valium producer, Roche Pharmaceuticals, vaccine manufacturer Sanofi and COVID-19 Vaccine creators AstraZeneca all showed web application vulnerabilities London, 9 November, 2021 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of its 2021 Web Application Security for Healthcare report...
Blog
Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a leading provider of password management and user authentication solutions headquartered in Stockholm, Sweden. STOCKHOLM, November 4, 2021 – Outpost24, an innovator in full stack cybersecurity assessment, today announced the acquisition of Specops Software, a...
Blog
Cybersecurity teams and CISOs of big organizations find it increasingly harder to understand all their internet-connected IT assets (known and unknown) that are deployed. Learn how External Attack Surface Management can help. Most CISOs would agree that knowing the full breath of your external attack surface is essential for 2...
Blog
A hacker would want to escalate their privileges in Windows to gain higher-level access, such as administrator rights, which allows them to control the system more fully. With elevated privileges, they can install malware, modify system settings, and access sensitive data. This level of access makes it easier to carry...
Blog
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP has announced the release for the new 2021 Top 10. Find out more about Broken Access Control and Cryptographic Failure vulnerabilities and understand what it means for application development and...
Blog
Thanks to its threat intelligence offering, Outpost24 is well-positioned to create attack scenarios in line with the TIBER-EU framework. These scenarios will provide in-depth insights into different adversaries and their tactics, techniques and procedures (TTPs). Threat Actor Profile of Lazarus Group in the Blueliv Threat Context module TIBER-EU tests...
Blog
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This certification recognizes European IT security companies for their reliable and trustworthy solutions. We are proud to share that Sweepatic – as the first External Attack Surface Management company – has...