Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Outpost24’s SaaS platform is well positioned to meet the surge of demand in cloud-based cybersecurity offerings, as companies adapt to remote working and cost saving measures. London, 16 December 2020 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announce the closing of a new funding round for SEK 200 million...
Blog
Introduction Threat Actors make use of packers when distributing their malware as they remain an effective way to evade detection and to make them more difficult to analyze. Manual analysis can defeat these protections and help to develop tools that allow the unpacking of the malware. To develop these tools,...
Blog
New web application security study found US retailers had a larger attack surface, while EU retailers run more outdated services. London, U.K. – 10 November 2020 - Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the results of the 2020 Web Application Security for Retail & E-commerce Report,...
Blog
Sweepatic, an Outpost24 brand, is included in the ECSO Cybersecurity Market Radar. The European Cyber Security Organisation (ECSO) has released the ECSO Cybersecurity Market Radar. The Radar provides information on cybersecurity products and services based on a unique market-oriented taxonomy and the size of the companies. The five designated capabilities...
Blog
The prestigious CREST accreditation confirms Outpost24’s place as a trusted provider with elite standards in web application penetration testing London, UK – September 14, 2020 – Outpost24, an innovator for full stack cyber security assessment, announced today it has been officially awarded the prestigious CREST accreditation as a penetration testing...
Blog
GuLoader is one of the most widely used loaders to distribute malware throughout 2020. Among the malware families distributed by GuLoader, we can find FormBook, AgentTesla and other commodity malware. A recent research performed by Check Point suggests that GuLoader code is almost identical to a loader named as CloudEye...
Blog
Modern web applications are complex, it is often made up of many layers where potential flaws could appear making it hard to secure. That’s why it’s important to understand the key attack vectors hackers use to spot entry points and map your attack surface during reconnaissance and work back from...
Blog
As with any apparently game-changing technology, the benefits and drawbacks of artificial intelligence (AI) should be qualified by an accurate definition of what AI means. The term has become so ubiquitous in the materials than describe cyber vendors’ products (for example), and so quickly, that the only logical conclusion is that the...
Blog
Misconfigurations are often seen as an easy target, as it can be easy to detect on misconfigured web servers, cloud and applications and then becomes exploitable, causing significant harm and leading to catastrophic data leakage issues for enterprises like the 2019 Teletext exposure of 530,000 data files which was caused...
Blog
Agent-based scanning helps organizations automate remote vulnerability assessment and enhance long term workforce security London, UK – June 1, 2020 – Outpost24, a global leader and innovator in identifying and managing cyber security exposure, today announced its Spring 2020 release which adds major new capabilities to help customers improve remote...