Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Attack Surface 101: How well do you know your organization’s attack surface
Blog
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an old college colleague, our teenage niece or that guy on Facebook we don’t really know exposing half of their life online. “Are they not thinking about the dangers?”  Now think...
Press Release: Outpost24 acquires cloud infrastructure security pioneer, SecludIT
Blog
Acquisition accelerates delivery of cloud, container, and virtualized security assessments to reduce business risk. Copenhagen, Denmark – January 23, 2018 Outpost24, a leading provider of Vulnerability Management solutions for commercial and government organizations, announced today that it acquired the business of SecludIT, an award-winning cloud infrastructure security pioneer.  The move...
USA.gov vulnerable to Subdomain takeover
Blog
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which enabled us to take over their subdomain. Of course, we then secured it from hostile hackers and through coordination by the National CSIRT in the US we helped to make...
How to analyze metadata and hide it from hackers
Blog
In this post, we're going to explore the dangers and risks of the tip of a very huge iceberg of sensitive information companies are exposing: the metadata of a document. “What is it and why is it such a juicy source of information for advanced attackers?” you might ask. Well,...
The dangerous art of subdomain enumeration
Blog
Subdomain enumeration is an essential part of the reconnaissance phase in the cyber kill chain. This is where cyber-attackers map out the digital footprint of the target in order to find weak spots to gain for example access to an internal network. In this post, we'll set you up with...
Tracking the footprints of PushDo Trojan
Blog
The Packer PushDo Trojan often comes along with a packer, which will unpack code in a separate process. As long as the malware is always injected in a separate process, the unpacked file begins with repairing all IAT entries needed for correcting Windows API resolution. In addition, it sets up...