Pwnie Express
447 FOLLOWERS
This consulting firm focuses on the internet of things and protecting wireless devices in the workplace. With the rise of IoT concerns, the blog offers an excellent entrance into the types of threats and issues facing companies.
Pwnie Express
11M ago
Outpost24 acquires external attack surface management provider Sweepatic to reduce risk exposure of internet facing assets
07.Jun.2023
Florian Barre Mon, 06/05/2023 - 08:00
Teaser
Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic ..read more
Pwnie Express
11M ago
Prioritizing Cybersecurity Risk with Vulnerability Prediction: Insights from Outpost24's Director of Product Management on Smashing Security
02.Jun.2023
Florian Barre Fri, 06/02/2023 - 08:15
Teaser
The Smashing Security podcast recently invited our Director of Product Management, John Stock, on to discuss our Vulnerability Prediction Technology (VPT) tool, the security challenges brought by remote work, and the importance of balancing risk management with business goals ..read more
Pwnie Express
11M ago
What is DORA? How to prepare your business for compliance
30.May.2023
Florian Barre Tue, 05/30/2023 - 04:40
Full-Stack Security
Teaser
Designed to support the digital resiliency of financial institutions in the EU and UK, the Digital Operational Resilience Act is set to go in effect in January 2025. In this blog, we take a deep dive into what organizations must do in order to be compliant with this new legislation ..read more
Pwnie Express
1y ago
KrakenLabs' Threat Actors Naming Convention
09.May.2023
Florian Barre Fri, 05/05/2023 - 03:54
Borja Rodriguez - Threat Hunting Team Lead at Outpost24
Threat Intelligence
Teaser
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor, which is helpful for identifying and mitigating threats effectively ..read more
Pwnie Express
1y ago
What’s the difference: Vulnerability scanning vs Penetration testing
27.Apr.2023
Florian Barre Thu, 04/27/2023 - 09:02
Penetration testing
Teaser
Vulnerability scanning and penetration testing should be an essential part of your cybersecurity strategy. This blog discusses the above methods in the context of securing your web applications, including the benefits, drawbacks, and compliance implications ..read more
Pwnie Express
1y ago
Outpost24 Expands Leadership Team by Appointing Brendan Hogan as Chief Strategy Officer
24.Apr.2023
Florian Barre Mon, 04/24/2023 - 02:04
Teaser
Outpost24, a leading innovator in cyber risk management, today announced it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company ..read more
Pwnie Express
1y ago
Does HIPAA require penetration testing?
14.Apr.2023
Florian Barre Tue, 04/11/2023 - 09:51
Penetration Testing
Teaser
The HIPAA Security Rule requires healthcare organizations to perform regular security risk assessments to protect e-PHI. Penetration testing can help organizations with this requirement ..read more
Pwnie Express
1y ago
Another Password Manager Breach: Practical Tips to Protect Stolen Credentials
05.Apr.2023
Florian Barre Wed, 04/05/2023 - 04:22
Password security
Teaser
In light of recent password manager breaches, our experts have provided tips on how to protect your organization from compromised credentials ..read more
Pwnie Express
1y ago
Everything you need to know about the LummaC2 stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing
05.Apr.2023
Florian Barre Thu, 03/30/2023 - 02:23
Alberto Marín, KrakenLabs Malware Sandbox Lead
Threat Intelligence
Teaser
In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an information stealer written in C language that has been sold in underground forums since December 2022. We assess LummaC2’s primary workflow, its different obfuscation techniques (like Windows API hashing and encoded strings) and how to ov ..read more
Pwnie Express
1y ago
The Russia-Ukraine crisis shakes up the cybercriminal ecosystem
02.Mar.2022
Florian Barre Wed, 03/29/2023 - 02:56
Beatriz Pimenta Klein, Lidia López Sanz, and Maria Grozdanova, with the support of the Blueliv Labs team from Outpost24
Threat Intelligence
Teaser
In this article, we will highlight the most relevant threat actors and attacks that took place in late February 2022, categorizing threat actors according to their political alignment ..read more