Horizon3.ai
Continuously find, fix, and verify your exploitable attack surface
Gartner® Report Hype Cycle™ for Security Operations, 2024
In our groundbreaking 2023 Annual Review, Horizon3.ai delves into the transformative approach of autonomous pentesting with NodeZero. This pivotal document is your gateway to mastering proactive cybersecurity defense mechanisms. The post Gartner® ...
NTLM Credential Theft in Python Windows Applications
This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post NTLM Credential Theft ...
Traccar 5 Remote Code Execution Vulnerabilities
This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post Traccar 5 Remote ...
Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™
Stephen Gates | | Cloud, Cybersecurity, Enterprise Leadership, Industry Insights, Security Practitioner
Master cloud security with NodeZero™ Cloud Pentesting. Easily uncover vulnerabilities across AWS and Azure, prioritize identity risks, and secure your environment in just minutes. Stay ahead of threats. The post Mastering Cloud ...
Future-Proofing Cities: LYT’s Story
As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient. The post Future-Proofing Cities: LYT’s Story appeared ...
Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action
Stephen Gates | | Cybersecurity, Enterprise Leadership, healthcare, Industry Insights, Security Practitioner
How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how ...
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
Stephen Gates | | Cybersecurity, Enterprise Leadership, Industry Insights, Security Practitioner, vulnerability scanning
Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security ...
Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces
This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach. The post Exploiting File Read ...
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability
Introduction Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centralized management of devices within an organization. On May 24, 2024, ZDI and Ivanti released an advisory describing ...
The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth
NodeZero helps JTI Cybersecurity scale by automating penetration testing, finding vulnerabilities, and enhancing client security efficiently and effectively. The post The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth ...