Search
421 Results Found Can't find what you're looking for? Search our Knowledge Base.
Blog
Key Points Everis was infected with BitPaymer (FriedEx/IEncrypt), a targeted ransomware operated by the Dridex Group. Domestic users are not affected by this threat, just businesses This security incident is unrelated to the attack suffered by Cadena SER (PRISA) There are no confirmations that any other Spanish companies were targeted in the same attack According...
Blog
Acquisition expands Outpost24 full stack security assessment to wireless airspace. London, UK – October 3, 2019 - Outpost24, an innovator in identifying and managing cyber exposure, today announced it has acquired Pwnie Express, the leading provider of threat detection for Bluetooth, wireless and IoT devices. Through the acquisition, Outpost24 extends its...
Blog
Outpost24 included in Vulnerability Risk Management Evaluation. Naperville, IL – Oct. 17, 2019 – Outpost24, an innovator in identifying and managing cyber exposure, today announced its recent recognition as a Challenger in “The Forrester WaveTM: Vulnerability Risk Management, Q4 2019.” The Forrester Wave highlights that Outpost24’s customer references “were consistently...
Blog
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied or abused. In many cases the law cannot help as the attacker cannot be identified. The problem of fake websites is well-known and attackers are abusing it on a daily basis....
Blog
New study reveals 42 percent of organisations are concerned about cloud security but many fail to carry out any security testing on the environment. London, UK – August 22, 2019 – With the recent exposure of a huge data breach affecting US bank Capital One, cloud security has once again...
Blog
Cyberattacks don’t begin with malware; they begin with intelligence. Before a single exploit is launched, threat actors conduct careful reconnaissance, mapping out their targets in detail. This often-overlooked phase of the attack lifecycle is where defenders have a unique opportunity to get ahead. In this post, we’ll explore cyber threat...
Blog
Successful cybercrime campaigns make use of different elements working together to achieve their common goal. In the case of Onliner, the spambot appears to be a key piece of the puzzle in the distribution process. Many malware campaigns have been successful because the spamming process was so effective. Blueliv's Head...
Blog
Many companies, however, don’t even recognize they’ve been attacked until months down the line, leaving them more susceptible to brand damage and greater financial loss. And today’s CISOs are well aware of the cost – their jobs depend on it. According to IBM the average cost for a data breach in 2018...
Blog
Looking back over the years and what we see happening now is the same attack vectors being used that have led to breaches. Web applications and the human element of security remain the cornerstones when it comes to protecting your organization against any weak spots. Your organization’s ever-expanding digital footprint...
Blog
Introduction In recent years, cyberthreat intelligence has become an important supporting pillar in a mature cybersecurity strategy. When applied well, threat intelligence can help security teams defend against an ever-more sophisticated threat landscape before, during and after attack. By studying adversaries and understanding their strategies and objectives, organizations can build...