Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an old college colleague, our teenage niece or that guy on Facebook we don’t really know exposing half of their life online. “Are they not thinking about the dangers?” Now think...
Blog
Acquisition accelerates delivery of cloud, container, and virtualized security assessments to reduce business risk. Copenhagen, Denmark – January 23, 2018 Outpost24, a leading provider of Vulnerability Management solutions for commercial and government organizations, announced today that it acquired the business of SecludIT, an award-winning cloud infrastructure security pioneer. The move...
Blog
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which enabled us to take over their subdomain. Of course, we then secured it from hostile hackers and through coordination by the National CSIRT in the US we helped to make...
Blog
In this post, we're going to explore the dangers and risks of the tip of a very huge iceberg of sensitive information companies are exposing: the metadata of a document. “What is it and why is it such a juicy source of information for advanced attackers?” you might ask. Well,...
Blog
Subdomain enumeration is an essential part of the reconnaissance phase in the cyber kill chain. This is where cyber-attackers map out the digital footprint of the target in order to find weak spots to gain for example access to an internal network. In this post, we'll set you up with...
Blog
The Packer PushDo Trojan often comes along with a packer, which will unpack code in a separate process. As long as the malware is always injected in a separate process, the unpacked file begins with repairing all IAT entries needed for correcting Windows API resolution. In addition, it sets up...