Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Adding context to information is essential for accurate decision making Internal vulnerability scanning is the foundation for vulnerability prioritization , collecting vulnerability data and categorizing it within a basic severity model. Adding external intelligence from a broad range of open, closed and private sources adds the necessary context for actions to...
Blog
Internet of Evil Things Survey reveals more than two-thirds are not regularly monitoring for security vulnerabilities on wireless devices London, UK – April 6th 2020 – Outpost24, an innovator in identifying and managing cyber security exposure, has today announced the results of the Internet of Evil Things survey conducted at...
Blog
Hackers are using the Reaver WPS tool to exploit the WiFi Protected Setup (WPS) feature found on many WiFi routers and access points. This method involves remotely brute-forcing the WPS handshaking process to potentially crack a WPA network. Most networks will now be running the much more robust WiFi Protected...
Blog
On the 3rd of January 2020, the Iranian Major General Qasem Soleimani was killed in a US drone strike ordered by President Donald Trump at Baghdad International Airport. Since then, popular demonstrations and military responses have been seen coming from Iran. It’s important to remember, however, that wars and military actions...
Blog
Introduction ServHelper is a backdoor first spotted at the end of 2018 by Proofpoint and linked to TA505. This threat actor is known to have distributed Dridex and Locky in the past, in addition to FlawedAmmyy, FlawedGrace and Get2/SDBBot more recently, amongst others. This blog post will offer some analysis on developments relating to ServHelper, including detail on relevant campaigns and those threat actors related to it. ServHelper was quiet...
Blog
Key Points Everis was infected with BitPaymer (FriedEx/IEncrypt), a targeted ransomware operated by the Dridex Group. Domestic users are not affected by this threat, just businesses This security incident is unrelated to the attack suffered by Cadena SER (PRISA) There are no confirmations that any other Spanish companies were targeted in the same attack According...
Blog
Acquisition expands Outpost24 full stack security assessment to wireless airspace. London, UK – October 3, 2019 - Outpost24, an innovator in identifying and managing cyber exposure, today announced it has acquired Pwnie Express, the leading provider of threat detection for Bluetooth, wireless and IoT devices. Through the acquisition, Outpost24 extends its...
Blog
Outpost24 included in Vulnerability Risk Management Evaluation. Naperville, IL – Oct. 17, 2019 – Outpost24, an innovator in identifying and managing cyber exposure, today announced its recent recognition as a Challenger in “The Forrester WaveTM: Vulnerability Risk Management, Q4 2019.” The Forrester Wave highlights that Outpost24’s customer references “were consistently...
Blog
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied or abused. In many cases the law cannot help as the attacker cannot be identified. The problem of fake websites is well-known and attackers are abusing it on a daily basis....
Blog
New study reveals 42 percent of organisations are concerned about cloud security but many fail to carry out any security testing on the environment. London, UK – August 22, 2019 – With the recent exposure of a huge data breach affecting US bank Capital One, cloud security has once again...