Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

CISO predictions: What does 2025 hold for attack surface management (ASM)?

We’ve asked Outpost24’s CISO, Martin Jartelius, what 2025 is likely to hold for organizations using attack surface management (ASM) tools. Here’s what Martin had to say about what he predicts for ASM in 2025, as well as some thought on how the CISOs role might change.

Ransomware Annual Report 2024

In 2024, the ransomware landscape recorded 5,414 published attacks on organizations worldwide, representing an 11% increase compared to 2023. While the year began with a decline in ransomware activity during Q1, the frequency of attacks surged in Q2 and continued to rise through the remainder of the year. This culminated in a dramatic spike during Q4, which saw 1,827 incidents—33% of all ransomware attacks for the year—making it the most active quarter.

Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown

The UK government decided to wage war on explicit deepfakes. About time, right? But before we start celebrating, let's take a closer look. The fact is that this isn’t about technology, it’s about human behaviour. The government is not trying to outright ban deepfakes, which would be impossible, to be honest. They're targeting the misuse of this tech for nefarious purposes.

McHacking - The 443 Podcast - Episode 317

This week on the podcast, we cover security researcher Eaton Zveare's recent blog post on a trove of vulnerabilities they found in McDonalds India's McDelivery web application. Before that, we give an update on Salt Typhoon's latest US government victim and discus an attack involving hijacked Google Chrome extensions. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How Attackers Exploit APIs for Rapid Data Breaches #Vulnerabilities #TechTrends #CyberThreats

Attackers now exploit APIs for rapid data breaches, taking advantage of a 96% rise in API-related vulnerabilities. Learn how realized risks (breaches) differ from unrealized risks (vulnerabilities) and why APIs are top targets. Stay informed on API security trends.

How to Install VMware Tools on Linux, Windows, MacOS, FreeBSD and Solaris

If you have ever deployed a VMware VM on VMware ESXi, VMware Workstation, VMware Player, or VMware Fusion, you’ve probably noticed that after installing a guest operating system (OS), you are asked to install VMware Tools. In this blog post, we cover what VMWare Tools is and the VMware Tools installation process on different operating systems including Linux, Windows, macOS, FreeBSD, and Solaris.

Single sign-on (SSO), simplify access and protect your business

Enterprises today are facing a complex working environment, where digitalization is advancing by leaps and bounds and technological tools are multiplying. This change has brought with it a key challenge: protecting and managing access to sensitive data. IT teams are overloaded with password-related tickets, while employees are dealing with multiple credential-management fatigue, a problem that affects both productivity and security.

Integrating Cybersecurity Functions into Dashboards: Examples with Open Source Frameworks

Cybersecurity has become a non-negotiable aspect of modern technology, with businesses and individuals alike seeking smarter ways to protect their digital assets. Among the most effective solutions are interactive dashboards that provide real-time insights and control over security measures. Leveraging vue dashboard framework like AdminForth, developers can seamlessly integrate security features to create custom, open-source dashboards that enhance visibility and control. These tools offer an accessible and cost-effective way to streamline cybersecurity operations.