logo
Outpost24 adds AI summaries to boost digital threat analysis

Outpost24 adds AI summaries to boost digital threat analysis

Techday NZ20-05-2025

Outpost24 has introduced AI-powered summaries to the Digital Risk Protection modules of its External Attack Surface Management platform.
The new feature is designed to provide efficient threat analysis by reducing the time security teams spend interpreting complex findings and helping organisations manage digital risks more effectively.
Outpost24's Digital Risk Protection modules enable organisations to identify, monitor, and protect against potential cyber threats before exploitation occurs. These modules continuously scan for exposed credentials, brand impersonations, data leaks, and other risks, but the volume and intricacy of findings can pose challenges for rapid decision-making by security professionals.
With the addition of AI-enhanced summaries, each DRP finding is automatically condensed into a 25-word explanation. By employing large language model (LLM) technology, the platform aims to streamline the interpretation of threat intelligence and provide concise, helpful information.
The AI-generated summaries are intended to offer content insights in an accessible format, translate threat information from foreign languages into English, and distil complex intelligence into key areas of concern for users.
"The latest AI-powered feature in Outpost24's Digital Risk Protection solution enhances efficiency by providing time-saving summaries that support informed decision-making and proactive threat management. We will continue expanding AI capabilities across our Attack Surface Management solutions," Omri Kletter, Chief Product Officer at Outpost24, said
The AI-enhanced summaries join the existing Domain Discovery AI feature in the External Attack Surface Management platform, reflecting Outpost24's ongoing research and development in artificial intelligence for attack surface management.
Outpost24 has stated that, although DRP results are inherently based on publicly available data, the company is taking steps to prevent further data exposure. The AI summaries will be generated through a private instance of a large language model to help ensure information is not leaked to third parties.
Outpost24, a prominent European cybersecurity firm specialising in Attack Surface Management (ASM), has solidified its position in the industry through strategic investments and leadership enhancements. The company is backed by Vitruvian Partners, an international investment firm known for supporting high-growth technology companies.
Founded in 2001 in Sweden, Outpost24 has expanded its global footprint, serving over 3,000 customers across 65 countries. The company's comprehensive cybersecurity solutions encompass ASM, Digital Risk Protection (DRP), and Identity and Access Management (IAM), enabling organizations to identify assets, mitigate risks, and monitor emerging threats effectively.
A key component of Outpost24's approach involves its team of ethical hackers who specialise in identifying and addressing complex threats. These professionals collaborate closely with client teams to enhance security measures and contribute to the broader cybersecurity community through research and intelligence sharing.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Outpost24 identifies key OAuth risks & best practice solutions
Outpost24 identifies key OAuth risks & best practice solutions

Techday NZ

time3 days ago

  • Techday NZ

Outpost24 identifies key OAuth risks & best practice solutions

An analysis by Outpost24 has examined seven of the most common vulnerabilities present in OAuth implementations and outlined recommended measures organisations can take to mitigate these risks. OAuth, short for Open Authorization, is a widely used industry protocol that allows users to grant access to their data on one site to another site, without sharing their credentials directly. This delegation of authority involves issuing tokens that provide time-limited and scoped permissions to client applications on behalf of users. Underlying complexity Although OAuth helps reduce direct exposure of user credentials and supports fine-grained access control, its broad flexibility also creates significant opportunities for errors during implementation. The protocol's reliance on strict validation of parameters, endpoints and tokens, as well as correct management of application state, means that mistakes or oversights can introduce vulnerabilities that attackers can exploit. Outpost24's analysis notes that OAuth is not inherently weak, but that its "power (delegated, token-based access) relies on numerous checks and balances. However, OAuth vulnerabilities often arise when developers or architects skip steps, like byte-for-byte URI validation, state verification, or signature checks on ID tokens. These oversights create exploitable gaps that attackers can target. So, OAuth itself isn't inherently 'weak'—but its flexibility and the proliferation of optional parameters and flows make it easy to misconfigure in ways that lead to real-world vulnerabilities." Common vulnerabilities The analysis identifies seven main areas where OAuth vulnerabilities commonly occur: 1. Open redirect and redirect URI manipulation: If the system does not strictly validate redirect URIs, attackers can manipulate authorisation flows to direct tokens or codes to endpoints they control, resulting in unauthorised access to user data. 2. Missing or weak Cross-Site Request Forgery (CSRF)/state protections: Failing to include a robust state parameter tied to each user's session enables attackers to trick users into completing authorisation requests that generate tokens for attacker-controlled clients. 3. Implicit flow and lack of Proof Key for Code Exchange (PKCE): The use of implicit flow, where access tokens are delivered directly via the browser, exposes tokens to interception. Without PKCE, even the more secure code flow can be susceptible if an attacker can access intermediate codes. 4. Inadequate scope validation and overly broad permissions: Applications may request excessive permissions, which can lead to abuse if an attacker acquires the access token. Users can be misled into granting high-privilege access. 5. Token leakage via insecure storage or transport: Storing tokens in browser storage areas accessible to client-side scripts, or transmitting them over insecure channels, can lead to theft through network compromise or browser vulnerabilities. 6. Missing or ineffective token revocation: Without appropriate means to revoke tokens, attackers or malicious clients may retain access indefinitely, even after a user believes they have rescinded authorisation. 7. Homegrown or outdated OAuth implementations: Custom or obsolete libraries may omit essential security checks, such as validating signature fields or all necessary request parameters, making exploitation feasible through replay or impersonation attacks. Mitigation strategies The analysis offers concrete recommendations to address each identified risk. For redirect URI threats, strict, exact matching of registered URIs is advised, along with enforcement of HTTPS. To defend against CSRF threats, the report urges clients to "generate a cryptographically random state value, store it in the user's session, and include it in the request. Strictly validate state on callback," and to make use of SameSite cookie attributes. The deprecation of the implicit flow and the universal adoption of PKCE are recommended for public clients. The analysis recommends the "use of authorization code flow + PKCE for all public clients", which helps bind token requests to verified identifiers, limiting misuse. Limiting scope requests to the minimal set required, alongside server-side validation of access scope, are key principles for scope management. Regarding token storage and transport, the advice is to "use secure, HttpOnly cookies for storing tokens" and to "enforce TLS everywhere… All endpoints (authorization, token, resource) must enforce HTTPS with strong ciphers." Short token lifetimes and refresh token rotation are also recommended to reduce the exposure following a token compromise. For revocation, the report recommends implementing dedicated endpoints that can invalidate access and refresh tokens in accordance with relevant standards, with continuous verification at the resource server layer to ensure revoked tokens remain unusable. On the issue of custom or outdated OAuth implementations, the recommendation is to "adopt well-maintained libraries and frameworks" and to "stay current with RFCs and security advisories," underscored by regular code reviews, threat modelling and attention to emerging IETF best practices. Operational recommendations To build a resilient OAuth deployment, enforce strict validation of redirect URIs, state parameters, and token signatures; adopt PKCE for all public clients; and adhere to least‐privilege scope requests. Ensure secure storage and transmission of tokens (favouring HttpOnly cookies over local storage) and implement token revocation with continuous introspection. Use community‐trusted OAuth libraries, keep up with evolving IETF/OAuth 2.1 guidelines, and maintain robust logging/monitoring to catch misuse quickly. Outpost24's analysis points out that by addressing these common misconfigurations and implementation issues, organisations "significantly reduce the risk of credential theft, unauthorised API access, and large-scale data breaches arising from flawed OAuth integrations."

Media Insider: NZME shareholder meeting - Steven Joyce set to become chair, Jim Grenon to join board; what to expect at today's meeting
Media Insider: NZME shareholder meeting - Steven Joyce set to become chair, Jim Grenon to join board; what to expect at today's meeting

NZ Herald

time02-06-2025

  • NZ Herald

Media Insider: NZME shareholder meeting - Steven Joyce set to become chair, Jim Grenon to join board; what to expect at today's meeting

All eyes will then be on the new-look board's first strategic moves, including the future direction of property portal OneRoof; whether the company wants to resurrect talks with Stuff to buy its paywalled websites, including The Post and The Press; and the establishment of an NZME editorial board 'to assist and advise the editorial team'. Joyce will - subject to shareholders confirming him and Grenon as new directors, as expected - take the reins as chair from Barbara Chapman, who will retire at the end of the ASM. NZME owns the NZ Herald, NewstalkZB, BusinessDesk and OneRoof; inset: NZME chair Barbara Chapman and shareholder Jim Grenon. Chapman, a former chief executive of ASB, has been subject to much of the wrath of some agitating shareholders over the past several months. Grenon, who now holds 13% of the company, is today expected to meet, for the first time, the NZME executives who have felt the brunt of his criticisms of the company over the past three months. He has highlighted concerns over the financial performance and operation of the company. 'It is concern about operational aspects of NZME that is driving this change,' he told the Herald in a statement in March. 'The editorial content is very much a side issue, but the quality of the journalism does impact everything else in the business and is also the board's ultimate responsibility. 'The new board intends to improve on the journalism, with an emphasis on factual accuracy, less selling of the writer's opinion and appealing to a wider political spectrum.' Influential major shareholder Roger Colman will also be at the ASM today, from Australia, as will be minor shareholder and former National Party leader Don Brash, from Tauranga. The meeting starts at 2pm. 'Best media board in Australasia' Colman said yesterday the new-look board would be the best media board in Australasia, citing the experience of the likes of Joyce, Horrocks, Turner and Pan. He said it was important to thank Grenon and NZME's biggest shareholder, Australian fund Spheria Asset Management, without whom the board changes would not have happened as quickly. Former National Party Cabinet Minister Steven Joyce. Photo / Nick Reed Now, he is keen to ensure the directors work in unison. 'It is important that these board members' relationship with Jim, and Jim's relationship with existing board members, is up to scratch. 'Everybody's on good behaviour - it's a question of how this is going to work, right?' NZME announced in March that Jarden was undertaking a strategic review of its property platform OneRoof. The media firm, which also owns the NZ Herald, Newstalk ZB, BusinessDesk and a suite of music stations and regional news titles, said it had launched the review to accelerate OneRoof's growth and realise its 'full potential in delivering value for shareholders'. Opportunities included the potential separation of OneRoof 'to enable raising external capital, either public or private, to surface its value'; 'potential pathways to value recognition and monetisation'; consolidation opportunities; and 'additional resourcing and extra capacity opportunities'. 'A progress update on this independent review will be provided as part of NZME's half-year results later in the year.' Editorial board NZME has already announced an editorial board will be established. Lawyer, blogger and former ZB Plus editor Philip Crump, who had originally been touted as one of Grenon's board directors, will be a member of the board. The scope of the board, including exactly how it will operate, and other members, have yet to be announced. Former National Party leader Don Brash. Photo / George Novak Meanwhile, Brash, whose group Hobson's Pledge had an advocacy advertisement turned down by NZME last year, told the Herald on Monday that he was planning to attend today's meeting. 'Whether I ask questions, I guess depends a bit on how the AGM evolves. 'I mean, clearly I'm pleased with the changes which have been announced. I've been subscribing to the Herald for a long, long time, and we were very disappointed - I was very disappointed personally - by the fact that we had some difficulty getting some advocacy ads run in the Herald. 'We thought they were legal and accurate. I'm hopeful that the change will make them more open to running advocacy ads as long as there's no legal problem.' He said he was aware NZME had changed its policy, so that advocacy ads could run in future inside the newspaper, rather than on the front page or 'wrapping' the newspaper. 'The unwillingness to carry ads on the front page always amuses me. You're happy to carry ads for an Australian appliance company day after day.' He said he may well reinforce the point that advocacy ads should be permitted. 'It is important that voices can be heard as long as they are in fact legal. 'We don't want anything obviously illegal or inappropriate but I don't think anything Hobson's Pledge has said or is likely to say will be breaking the law.' Brash said he was intending to book a full-page advocacy ad in the Weekend Herald next Saturday - it was not connected to Hobson's Pledge and would be announced later in the week. A newspaper 'for everybody' Amplifying Brash's comments, Colman said a newspaper had to be 'for everybody'. 'There's a pendulum - it swings left to right at various elections all the time. Sometimes the conservatives are in power, sometimes the progressives are in power. The paper's got to cover all bases.' Roger Colman addresses the NZME shareholders meeting in 2024. Photo / Sylvie Whinray This was especially important, he said, given that NZME still employed a substantial percentage of journalists, especially in the wake of the closure of Newshub and other industry cutbacks. He estimated NZME had doubled its percentage of the overall number of New Zealand journalists as a result of the cutbacks at other newsrooms. In the normal course of events, media wouldn't take a lot of interest in NZME's annual shareholder meeting. However, there is still considerable interest in what unfolds today, and NZME expects to accommodate at least half a dozen reporters as well as cameras at the ASM. Meanwhile, Brash believed Joyce would make a good chair. The pair had worked together when Brash was leader of the National Party, and Joyce was in leadership roles for the party, including as general manager and election campaign director. 'He wasn't at that point in parliament, but he was a very effective executive director of the National Party, and we worked together very well,' said Brash. 'I had left Parliament before he came in [as an MP] in 2008. I left in 2007 so we didn't actually serve in the Parliament together, but my impression is he was a very competent minister.' Brash has bought 1000 shares in NZME. This allows him to attend the ASM. 'As a shareholder, I hope he runs the company well. I'm a very modest shareholder, I don't have any particularly strong views about his chairmanship. I'm sure he will do a good job - he's a very competent guy, and of course, he's been in the media himself prior to going to politics. 'In a sense, the developments that have taken place in the last few weeks may make it less important for me to make a public statement. 'I'm pleased with what's happened, and if I say anything at all, it will be in support of what's happened.' Editor-at-Large Shayne Currie is one of New Zealand's most experienced senior journalists and media leaders. He has held executive and senior editorial roles at NZME including Managing Editor, NZ Herald Editor and Herald on Sunday Editor and has a small shareholding in NZME. Watch Media Insider - The Podcast on YouTube, or listen to it on iHeartRadio, Spotify, Apple Podcasts, or wherever you get your podcasts.

Outpost24 adds AI summaries to boost digital threat analysis
Outpost24 adds AI summaries to boost digital threat analysis

Techday NZ

time20-05-2025

  • Techday NZ

Outpost24 adds AI summaries to boost digital threat analysis

Outpost24 has introduced AI-powered summaries to the Digital Risk Protection modules of its External Attack Surface Management platform. The new feature is designed to provide efficient threat analysis by reducing the time security teams spend interpreting complex findings and helping organisations manage digital risks more effectively. Outpost24's Digital Risk Protection modules enable organisations to identify, monitor, and protect against potential cyber threats before exploitation occurs. These modules continuously scan for exposed credentials, brand impersonations, data leaks, and other risks, but the volume and intricacy of findings can pose challenges for rapid decision-making by security professionals. With the addition of AI-enhanced summaries, each DRP finding is automatically condensed into a 25-word explanation. By employing large language model (LLM) technology, the platform aims to streamline the interpretation of threat intelligence and provide concise, helpful information. The AI-generated summaries are intended to offer content insights in an accessible format, translate threat information from foreign languages into English, and distil complex intelligence into key areas of concern for users. "The latest AI-powered feature in Outpost24's Digital Risk Protection solution enhances efficiency by providing time-saving summaries that support informed decision-making and proactive threat management. We will continue expanding AI capabilities across our Attack Surface Management solutions," Omri Kletter, Chief Product Officer at Outpost24, said The AI-enhanced summaries join the existing Domain Discovery AI feature in the External Attack Surface Management platform, reflecting Outpost24's ongoing research and development in artificial intelligence for attack surface management. Outpost24 has stated that, although DRP results are inherently based on publicly available data, the company is taking steps to prevent further data exposure. The AI summaries will be generated through a private instance of a large language model to help ensure information is not leaked to third parties. Outpost24, a prominent European cybersecurity firm specialising in Attack Surface Management (ASM), has solidified its position in the industry through strategic investments and leadership enhancements. The company is backed by Vitruvian Partners, an international investment firm known for supporting high-growth technology companies. Founded in 2001 in Sweden, Outpost24 has expanded its global footprint, serving over 3,000 customers across 65 countries. The company's comprehensive cybersecurity solutions encompass ASM, Digital Risk Protection (DRP), and Identity and Access Management (IAM), enabling organizations to identify assets, mitigate risks, and monitor emerging threats effectively. A key component of Outpost24's approach involves its team of ethical hackers who specialise in identifying and addressing complex threats. These professionals collaborate closely with client teams to enhance security measures and contribute to the broader cybersecurity community through research and intelligence sharing.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store