Horizon3.ai

SEARCH

CATEGORIES

TAGS

    Healthcare Faces an Aggressive Threat Landscape – How To Remediate It With Node Zero

    May 25, 2022
    Podcast Channel of AST Cybersecurity: 05/25/22. Horizon3.ai CEO and co-founder Snehal Antani joins Ravi Das to discuss the cybersecurity challenges of the healthcare industry.

    XorDDos sees significant spike in activity

    May 24, 2022
    XorDdos Is continuing to hunt servers with weak passwords. According to a recent post from Microsoft, there’s been a 254% increase in activity from XorDdos – an eight-year-old network of infected Linux machines used for DDoS attacks.

    Roundup: Awards, Education and M&A Cybersecurity

    May 20, 2022
    Horizon3.ai news, including an award nomination, plus cybersecurity updates for education and M&A.

    Log4Shell RCE Vulnerability in Apache Log4j: The Gift No One Wished For

    May 16, 2022
    The Log4Shell RCE vulnerability in Apache Log4j, CVE-2021-44228, dates to 2013 when Log4j 2.0-beta9 was released. An analysis of our pentesting data using NodeZero identified and provided proof of exploit for over 105 unique instances of the CVE within our customers’ environments.

    Horizon3.ai Researchers Able to Create Exploit for Critical F5 BIG-IP Flaw

    May 10, 2022
    It took just two days for a pair of researchers from Horizon3.ai to discover exploits for the new F5 BIG-IP vulnerability, and have called for devices to be immediately updated to protect against bad actors.

    2022 SANS Analyst Report

    April 17, 2022
    SANS First Look: New technologies are emerging to help provide more consistent, repeatable pen tests that mimic real-world attack techniques.

    Misreporting Tools Leave Servers Vulnerable for 18 Months

    April 6, 2022
    Teaching hospital insisted on false positive when NodeZero exploited a critical but year-old vulnerability in under one day, but...
    Misreporting Tools Leave Servers Vulnerable for 18 Months

    My Endpoint Detection and Response (EDR) Should Have Caught That!

    April 6, 2022
    It isn’t enough to have to have the security solution. A medical clinic with over 120 providers used best-in-class endpoint detection and response (EDR) software. Nevertheless, NodeZero quickly identified a device’s Local Security Authority Subsystem Service Process (LSASS), dump and cracked user credentials, moved laterally, and gained Windows Domain Administrator privileges. The result: full domain…
    My EDR Should Have Caught That!

    Defense in Depth

    February 19, 2022
    Defense in depth is a proven strategy for protecting systems and software from insider and external attacks.
    Defense in Depth Whitepaper

    The Industry Standard Model is the Vulnerability

    February 11, 2022
    Which is more valuable to you; the ability to identify a problem, or the ability to solve the problem? There is a plethora of vulnerability scanning tools that do a decent job identifying vulnerabilities. Unfortunately, those tools rarely discern the possible from the exploitable.