Outpost24 acquires external attack surface management provider Sweepatic to reduce risk exposure of internet facing assets
Pwnie Express
by Florian Barre
11M ago
Outpost24 acquires external attack surface management provider Sweepatic to reduce risk exposure of internet facing assets 07.Jun.2023 Florian Barre Mon, 06/05/2023 - 08:00 Teaser Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic ..read more
Visit website
Prioritizing Cybersecurity Risk with Vulnerability Prediction: Insights from Outpost24's Director of Product Management on Smashing Security
Pwnie Express
by Florian Barre
11M ago
Prioritizing Cybersecurity Risk with Vulnerability Prediction: Insights from Outpost24's Director of Product Management on Smashing Security 02.Jun.2023 Florian Barre Fri, 06/02/2023 - 08:15 Teaser The Smashing Security podcast recently invited our Director of Product Management, John Stock, on to discuss our Vulnerability Prediction Technology (VPT) tool, the security challenges brought by remote work, and the importance of balancing risk management with business goals ..read more
Visit website
What is DORA? How to prepare your business for compliance
Pwnie Express
by Florian Barre
11M ago
What is DORA? How to prepare your business for compliance 30.May.2023 Florian Barre Tue, 05/30/2023 - 04:40 Full-Stack Security Teaser Designed to support the digital resiliency of financial institutions in the EU and UK, the Digital Operational Resilience Act is set to go in effect in January 2025. In this blog, we take a deep dive into what organizations must do in order to be compliant with this new legislation ..read more
Visit website
KrakenLabs' Threat Actors Naming Convention
Pwnie Express
by Florian Barre
1y ago
KrakenLabs' Threat Actors Naming Convention 09.May.2023 Florian Barre Fri, 05/05/2023 - 03:54 Borja Rodriguez - Threat Hunting Team Lead at Outpost24 Threat Intelligence Teaser KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is helpful for identifying and mitigating threats effectively ..read more
Visit website
What’s the difference: Vulnerability scanning vs Penetration testing
Pwnie Express
by Florian Barre
1y ago
What’s the difference: Vulnerability scanning vs Penetration testing 27.Apr.2023 Florian Barre Thu, 04/27/2023 - 09:02 Penetration testing Teaser Vulnerability scanning and penetration testing should be an essential part of your cybersecurity strategy. This blog discusses the above methods in the context of securing your web applications, including the benefits, drawbacks, and compliance implications ..read more
Visit website
Outpost24 Expands Leadership Team by Appointing Brendan Hogan as Chief Strategy Officer
Pwnie Express
by Florian Barre
1y ago
Outpost24 Expands Leadership Team by Appointing Brendan Hogan as Chief Strategy Officer 24.Apr.2023 Florian Barre Mon, 04/24/2023 - 02:04 Teaser Outpost24, a leading innovator in cyber risk management, today announced it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company ..read more
Visit website
Does HIPAA require penetration testing?
Pwnie Express
by Florian Barre
1y ago
Does HIPAA require penetration testing? 14.Apr.2023 Florian Barre Tue, 04/11/2023 - 09:51 Penetration Testing Teaser The HIPAA Security Rule requires healthcare organizations to perform regular security risk assessments to protect e-PHI. Penetration testing can help organizations with this requirement ..read more
Visit website
Another Password Manager Breach: Practical Tips to Protect Stolen Credentials
Pwnie Express
by Florian Barre
1y ago
Another Password Manager Breach: Practical Tips to Protect Stolen Credentials 05.Apr.2023 Florian Barre Wed, 04/05/2023 - 04:22 Password security Teaser In light of recent password manager breaches, our experts have provided tips on how to protect your organization from compromised credentials ..read more
Visit website
Everything you need to know about the LummaC2 stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing
Pwnie Express
by Florian Barre
1y ago
Everything you need to know about the LummaC2 stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing 05.Apr.2023 Florian Barre Thu, 03/30/2023 - 02:23 Alberto Marín, KrakenLabs Malware Sandbox Lead Threat Intelligence Teaser In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an information stealer written in C language that has been sold in underground forums since December 2022. We assess LummaC2’s primary workflow, its different obfuscation techniques (like Windows API hashing and encoded strings) and how to ov ..read more
Visit website
The Russia-Ukraine crisis shakes up the cybercriminal ecosystem
Pwnie Express
by Florian Barre
1y ago
The Russia-Ukraine crisis shakes up the cybercriminal ecosystem 02.Mar.2022 Florian Barre Wed, 03/29/2023 - 02:56 Beatriz Pimenta Klein, Lidia López Sanz, and Maria Grozdanova, with the support of the Blueliv Labs team from Outpost24 Threat Intelligence Teaser In this article, we will highlight the most relevant threat actors and attacks that took place in late February 2022, categorizing threat actors according to their political alignment ..read more
Visit website

Follow Pwnie Express on FeedSpot

Continue with Google
Continue with Apple
OR