research
Gartner® Report Hype Cycle™ for Security Operations, 2024
In our groundbreaking 2023 Annual Review, Horizon3.ai delves into the transformative approach of autonomous pentesting with NodeZero. This pivotal document is your gateway to mastering proactive cybersecurity defense mechanisms. The post Gartner® ...
Mythic 3.3 — Out of Beta
Mythic 3.3 — Out of BetaMythic 3.3 was released in a Beta six weeks ago, and since then there has been a bunch of feedback, not just about new Mythic 3.3 features but about the ...
2024 US Presidential Election: Politically Motivated Threats Target Range of Stakeholders
Nisos 2024 US Presidential Election: Politically Motivated Threats Target Range of Stakeholders Thomas Matthew Crook’s attempt to assassinate former president and current presidential candidate Donald Trump during a rally in Butler, Pennsylvania, ...
Will We Survive The Transitive Vulnerability Locusts
Understanding and Mitigating the Risks of Transitive Vulnerabilities in Application Security At OX Security, our mission is to eliminate manual AppSec processes. Our latest research, presented at Black Hat 2024, highlights a ...
How to Prepare for the Cyber Resilience Act
The post How to Prepare for the Cyber Resilience Act appeared first on AI-enhanced Security Automation ...
How ASPM Solutions Help Organizations Prepare for the EU’s DORA
The European Union’s Digital Operational Resilience Act (DORA), passed in late 2022, is set to take full effect by early 2025. DORA establishes new cybersecurity standards for financial institutions operating and doing ...
Building Trustworthy AI: Contending with Data Poisoning
Nisos Building Trustworthy AI: Contending with Data Poisoning As Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and integrated globally, the threat of data poisoning attacks remains... The post Building ...
Securing Artifacts: Keyless Signing with Sigstore and CI/MON
Artifact integrity is crucial in maintaining software security and trustworthiness. High-profile breaches like SolarWinds, CodeCov, 3CX, and JumpCloud have shown how altering artifact contents can lead to significant security vulnerabilities, enabling attackers ...
Ducks Now Sitting (DNS): Internet Infrastructure Insecurity
Was it DNS? It’s always DNS. In this case, DNS (Domain Name System) is filled with sitting ducks (Ducks Now Sitting) for domain name hijacking. Multiple threat actors have been exploiting this ...
Trump Campaign Crypto Scam: Unveiling the Phishing Plot
Uncovering a phishing scam targeting Trump's supporters using crypto donations. Learn how to spot fraudulent sites and stay protected. Stay informed and vigilant. The post Trump Campaign Crypto Scam: Unveiling the Phishing ...