threat intelligence dashboard

Thanks for reaching out about Threat Compass, Outpost24’s Cyber Threat Intelligence solution

A cyber threat intelligence expert will be in touch soon to schedule your live demonstration.

Each Threat Compass module is backed up by our world-class in-house analyst team and can be acquired and used individually giving you the flexibility to choose the intelligence that is most relevant to your business. Enrich and contextualize threats so you can defend your assets and understand your adversaries’ plans before they strike.


Need Support?

Minimizing intrusion detection time with cyber threat intelligence
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks. In their latest report, M-Trends highlighted an interesting trend: the global median dwell time, or the period required for a victim to detect an intrusion, dropped from 21 days in 2021 to 16 days in […]
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity practitioners. We will translate all these understandings into real-life applications to empower the analyst to properly classify clusters of malicious activities. This way, we as a community strengthen our analytical capabilities to better assess collected […]
Everything you need to know about the LummaC2 stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing
Everything you need to know about the LummaC2 stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API hashing
Research & Threat Intel
In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an information stealer written in C language that has been sold in underground forums since December 2022. We assess LummaC2’s primary workflow, its different obfuscation techniques (like Windows API hashing and encoded strings) and how to overcome them to effectively analyze the malware with ease. We will also analyze how networking communications with the C2 work and summarize LummaC2’s MITRE Adversarial Tactics, Techniques and Common Knowledge.