Search
406 Results Found Can't find what you're looking for? Search our Knowledge Base.
page
Our DRP modules Each DRP module is backed up by our world-class in-house analyst team. Enrich and contextualize threats so you can defend your assets and understand your adversaries’ plans before they strike. Credentials Detect and retrieve your compromised credentials in real-time. Data Leakage Detect leaked documents and information from...
page
About CyberFlex: The best of EASM & PTaaS CyberFlex is an Outpost24 solution that combines the strengths of our Pen-testing-as-a-Service (PTaaS) and External Attack Surface Management (EASM) solutions. Customers benefit from continuous coverage of their entire application attack surface, while enjoying a flexible consumption model. Our expert pen testers deliver deep,...
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from May about Scattered Spider, Lumma Stealer and more. Threat actor of the month:...
Blog
Recognition Solidifies Outpost24’s Leadership in Attack Surface Management PHILADELPHIA (May 27, 2025) — Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced it has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management and is the only...
Resource > Research
We’re pleased to be the only European vendor named as an Overall Leader by KuppingerCole in their Leadership Compass Report for Attack Surface Management. Outpost24 was also named as a leader in the Product and Market categories. KuppingerCole are leading analysts in the areas of digital identities, authentication, and cybersecurity....
Blog
External attack surfaces have never been more sprawling, or more vulnerable. As organizations increasingly rely on dynamic, cloud-based infrastructures, and third-party services, digital footprints are only going to carry on growing. So, it’s no surprise many are turning towards External Attack Surface Management (EASM) tools for more visibility into both...
Blog
Digital Risk Protection (DRP) helps organizations identify, monitor, and protect against threats across their digital footprint. The goal is to catch risks on the open, deep, and dark web before they can be exploited, by aggregating threat intelligence from diverse external sources (social media, underground forums, code repositories, and paste...
Blog
Despite advancements in security, web applications are still a problem. Attackers target web applications because they’re exposed, complex, and not as well protected as they should be. According to Verizon1, web applications are the most prevalent attack vector, with exploitations of vulnerabilities increasing by 180% in 2024. The digital world...
Resource > Whitepapers
Digital footprints are growing at an unprecedented rate Attack surfaces are broader and more complex than ever. Threat actors will actively search for vulnerabilities in an organization’s attack surface, looking for the path of least resistance. Unknown subdomains, forgotten development environments, unsecured APIs, and abandoned cloud resources can all become...
Blog
Today marks Microsoft’s Patch Tuesday for May 2025, addressing a total of 78 vulnerabilities. Among these, a few are actively being exploited. Most require the attacker to have local access, but one can be executed remotely if the attacker tricks a user into clicking a malicious link. Notable Patch Tuesday...