How EASM helps big organizations to understand and secure...
EASM
Cybersecurity teams and CISOs of big organizations find it increasingly harder to understand all their internet-connected IT assets (known and...
Three ways to escalate privileges (and steal credentials) in...
Cybersecurity News
Read how our red team used different attack techniques to hack AppLocker restrictions by implementing escalated privileges and reusing the...
OWASP top 10 2021: what’s new and changed
Application Security
It doesn’t seem that long ago that I wrote about the OWASP Top 10 changes that came in 2017. OWASP...
hacker image
Outpost24 supports TIBER-EU for threat intelligence-based ethical red-teaming
Research & Threat Intel
TIBER-EU is the European framework for threat intelligence-based ethical red-teaming and the first EU-wide guide on how authorities, threat intelligence...
Sweepatic obtains the Cybersecurity Made in Europe Label from...
EASM
Sweepatic, an Outpost24 brand, has received the Cybersecurity Made in Europe label from the European Cyber Security Organisation (ECSO). This...