Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Spanish consultancy Everis suffers BitPaymer ransomware attack: a brief analysis
Blog
​ Key Points  Everis was infected with BitPaymer (FriedEx/IEncrypt), a targeted ransomware operated by the Dridex Group. Domestic users are not affected by this threat, just businesses  This security incident is unrelated to the attack suffered by Cadena SER (PRISA)  There are no confirmations that any other Spanish companies were targeted in the same attack  According...
Press Release: Outpost24 acquires wireless security pioneer Pwnie Express
Blog
Acquisition expands Outpost24 full stack security assessment to wireless airspace. London, UK – October 3, 2019 - Outpost24, an innovator in identifying and managing cyber exposure, today announced it has acquired Pwnie Express, the leading provider of threat detection for Bluetooth, wireless and IoT devices.  Through the acquisition, Outpost24 extends its...
Press Release: Outpost24 recognized among most significant Vulnerability Risk Management vendors
Blog
Outpost24 included in Vulnerability Risk Management Evaluation. Naperville, IL – Oct. 17, 2019 – Outpost24, an innovator in identifying and managing cyber exposure, today announced its recent recognition as a Challenger in “The Forrester WaveTM: Vulnerability Risk Management, Q4 2019.” The Forrester Wave highlights that Outpost24’s customer references “were consistently...
How to protect your brand from cybersquatting
Blog
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied or abused. In many cases the law cannot help as the attacker cannot be identified. The problem of fake websites is well-known and attackers are abusing it on a daily basis....
Press Release: 37% of organisations have suffered a cyberattack on cloud environments due to the lack of basic cloud security hygiene
Blog
New study reveals 42 percent of organisations are concerned about cloud security but many fail to carry out any security testing on the environment. London, UK – August 22, 2019 – With the recent exposure of a huge data breach affecting US bank Capital One, cloud security has once again...
Understanding Cyber Threat Reconnaissance with MITRE’s PRE-ATT&CK Framework
Blog
Cyberattacks don’t begin with malware; they begin with intelligence. Before a single exploit is launched, threat actors conduct careful reconnaissance, mapping out their targets in detail. This often-overlooked phase of the attack lifecycle is where defenders have a unique opportunity to get ahead. In this post, we’ll explore cyber threat...
An analysis of a spam distribution botnet: the inner workings of Onliner Spambot
Blog
Successful cybercrime campaigns make use of different elements working together to achieve their common goal. In the case of Onliner, the spambot appears to be a key piece of the puzzle in the distribution process. Many malware campaigns have been successful because the spamming process was so effective. Blueliv's Head...
Real-time threat detection and why timing is the key to threat intelligence
Blog
Many companies, however, don’t even recognize they’ve been attacked until months down the line, leaving them more susceptible to brand damage and greater financial loss. And today’s CISOs are well aware of the cost – their jobs depend on it. According to IBM the average cost for a data breach in 2018...
The top 10 list of the world’s biggest cyberattacks
Blog
Looking back over the years and what we see happening now is the same attack vectors being used that have led to breaches. Web applications and the human element of security remain the cornerstones when it comes to protecting your organization against any weak spots. Your organization’s ever-expanding digital footprint...
What is Threat Intelligence and why is it important?
Blog
Introduction In recent years, cyberthreat intelligence has become an important supporting pillar in a mature cybersecurity strategy. When applied well, threat intelligence can help security teams defend against an ever-more sophisticated threat landscape before, during and after attack. By studying adversaries and understanding their strategies and objectives, organizations can build...