Syndicated Blog

Horizon3.ai
Continuously find, fix, and verify your exploitable attack surface
Gartner® Report Hype Cycle™ for Security Operations, 2024

Gartner® Report Hype Cycle™ for Security Operations, 2024

In our groundbreaking 2023 Annual Review, Horizon3.ai delves into the transformative approach of autonomous pentesting with NodeZero. This pivotal document is your gateway to mastering proactive cybersecurity defense mechanisms. The post Gartner® ...
NTLM Credential Theft in Python Windows Applications

NTLM Credential Theft in Python Windows Applications

This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post NTLM Credential Theft ...
Traccar 5 Remote Code Execution Vulnerabilities

Traccar 5 Remote Code Execution Vulnerabilities

This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post Traccar 5 Remote ...
NodeZero Cloud Pentesting

Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™

Master cloud security with NodeZero™ Cloud Pentesting. Easily uncover vulnerabilities across AWS and Azure, prioritize identity risks, and secure your environment in just minutes. Stay ahead of threats. The post Mastering Cloud ...
Future-Proofing Cities: LYT’s Story

Future-Proofing Cities: LYT’s Story

As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient. The post Future-Proofing Cities: LYT’s Story appeared ...
Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action

Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action

How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how ...
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing

Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing

Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security ...
Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces

Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces

This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post Exploiting File Read ...
RecordGoodApp Search

CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability

Introduction Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centralized management of devices within an organization. On May 24, 2024, ZDI and Ivanti released an advisory describing ...

The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth

NodeZero helps JTI Cybersecurity scale by automating penetration testing, finding vulnerabilities, and enhancing client security efficiently and effectively. The post The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth ...

Application Security Check Up