Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
Introducing Social Media and Data Leakage to Outpost24’s EASM platform
Blog
Digital Risk Protection (DRP) lets organizations proactively identify and mitigate external threats that emerge from their digital footprints. This can span public sources as well as deep and dark web channels. DRP is a key element of Outpost24’s external attack surface management (EASM) platform, so we’re pleased to announce two new...
Threat Context monthly, April 2025: EncryptHub & Media Land leak
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from April about EncryptHub, EncryptRAT, and the Media Land leak. Threat actor of the...
Homograph attacks: How hackers exploit look-alike domains
Blog
Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser's security measures. The researcher registered a domain that appeared as "xn--80ak6aa92e.com" but displayed as "apple.com" in the browser, demonstrating how easy it was to deceive users. This is just one...
Responsible vulnerability disclosure: Why it matters
Blog
The concept of responsible disclosure is a simple one. If you find a vulnerability, you let the affected organization or software vendor know before making the information public. This gives them time to patch the vulnerability before it can be exploited. It also helps maintain trust and fosters a collaborative...
6 common authentication vulnerabilities in web apps  
Blog
Authentication is used by most web applications. Both for letting users have access to individual accounts, but also for protecting certain resources from the public. Basic authentication allows an individual to prove to the application that they are the user that is trying to access it. Unfortunately, authentication vulnerabilities are often...
Microsoft Patch Tuesday – April 2025
Blog
Today marks Microsoft’s Patch Tuesday for April 2025, addressing a total of 126 vulnerabilities. This is in addition to nine vulnerabilities that were resolved in Microsoft Edge earlier this month. Among these, there are four significant unauthenticated remote code execution vulnerabilities and one notable local privilege escalation vulnerability. One of...
Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders  
Blog
This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations at the time of writing. We’ve already published one article explaining EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and targets.  This...
CrushFTP auth bypass vulnerability: Disclosure mess leads to attacks 
Blog
Outpost24 analysts recently discovered a critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161. The vulnerability has a CVSSv3.1 score of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8). We reached out to MITRE for a CVE on 13th March 2025 and were within an agreed 90-day non-disclosure period with CrushFTP. The plan was to give...
Threat Context Monthly: Green Nailao & UNC3886 – Briefing for March 2025  
Blog
Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from March about espionage activities by threat actors Green Nailao and UNC3886. Spotlight threat:...
Introducing dark web insights to Outpost24’s EASM platform 
Blog
We’re pleased to announce that a new Digital Risk Protection (DRP) integration has been added to Outpost24’s External Attack Surface management (EASM) platform: the Dark Web module.   Security teams need complete visibility on their organization’s exposure and potential threats. This doesn’t only include your owned online assets, but also your...