cyber-intrusion
Dark AI tools: How profitable are they in the...
Research & Threat Intel
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...
engineering attacks
Red team exercises against social engineering attacks
Cybersecurity News
This article examines social engineering attacks that exploit flaws in human psychology and outlines how red teaming simulations help you...
mitre framework
Using Mitre Att&CK with threat intelligence to improve Vulnerability...
Research & Threat Intel
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...
NIS2 Directive
The NIS2 Directive and how to prepare for compliance
Compliance & Regulations
In this blog we explore the NIS2 Directive, a series of measures for improving cyber risk management throughout the European...
press-release
Outpost24 CORE delivers complete visibility of technology assets and...
Press Release
New threat exposure management capabilities give cybersecurity leaders and their teams unified insights into their exposure to prioritize and quickly...