Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Meet us at ANNACON 0x7E9 2025
Resource >
The conference takes place on Wednesday, October 22, 2025. And it is held in Dutch, ensuring that the content is tailored to the specific needs and challenges of the local information security landscape. The event is designed to foster a local community. By attending, you can engage in meaningful discussions...
Web Application Firewalls (WAFs): A false sense of security? 
Blog
Web application firewalls (WAF) is a protection mechanism to help block potential malicious requests before they can reach the application itself. Often this is implemented as a proxy, intercepting HTTP requests, analyzing them, and finally deciding on an action. While effective, over relying on it could lead to a false...
Olymp Loader: A new Malware-as-a-Service written in Assembly
Blog
Olymp Loader is a Malware-as-a-Service (MaaS) advertised on underground forums and Telegram since June 5, 2025. The seller, “OLYMPO”, presents Olymp Loader as fully written in assembly language and frequently markets it as FUD (Fully UnDetectable). Despite its recent appearance, many underground forum users have already posted positive reviews. Executes...
Outpost24 introduces new pen test reports and packages for mobile apps and APIs 
Blog
Philadelphia, PA, 23rd September – Outpost24, a leading provider of exposure management solutions, today announced the launch of new pen test reporting, giving customers a consolidated view of all penetration testing results within a single platform. This eliminates the need to manage multiple reports from different sources, saving time and...
zerodayx1: Hacktivist groups turning to ransomware operations
Blog
In July 2025, pro-Palestinian hacktivist group zerodayx1 launched its own Ransomware-as-a-Service (RaaS) operation, following the path of other hacktivist teams. They loudly announced the initiative on platforms commonly used for such purposes, including X (formerly Twitter) and Telegram. Zerodayx1 exemplifies the ongoing evolution of these groups, underscoring the importance of...
Protected: Example – password protected content partners
page
This content is password-protected. To view it, please enter the password below. Password:
Seven ways AI could impact the future of pen testing
Blog
In an era where attack surfaces are expanding faster than ever, AI has the potential to transform how organizations find and fix vulnerabilities. Gartner estimates AI agents will reduce the time it takes to exploit account vulnerabilities by 50%. From automating routine scans to developing self-learning attack agents, AI is...
Microsoft Patch Tuesday – September 2025
Blog
Today marks Microsoft Patch Tuesday for September 2025, addressing 86 vulnerabilities. This includes several remote code execution and privilege escalation issues. As always, ensure your networks are updated promptly. Notable Patch Tuesday vulnerabilities for September CVE-2025-55232: A flaw in Microsoft High Performance Compute Pack could allow attackers to execute code...
Business logic: The silent future of cyberattacks
Blog
Future hacks won’t trigger alarms or leave traces. No security measures will be violated. The systems are functioning normally – but the loss is real. As automated defenses improve, attackers must target what machines can’t: the business processes. By exploiting flaws in workflow logic, hackers can steal data and funds...
Outpost24 Recognized as a Major Player in IDC MarketScape for Exposure Management
Blog
PHILADELPHIA (Aug 25, 2025) - Outpost24, a leading provider of exposure management solutions, today announced it has been named as a Major Player in the IDC MarketScape: Worldwide Exposure Management 2025 Vendor Assessment. The Outpost24 team believes this recognition underscores our comprehensive exposure management solutions and commitment to delivering exceptional...