Blogs
Filter Content:
Categories:
Tags:
June 9, 2022 | Blogs
Shields Health Care Group, Inc. reported this week that it is investigating a data breach which may have impacted 56…June 3, 2022 | Blogs
University credentials being sold on the dark web and used against individuals or the institution itself in subsequent cyberattacks.June 2, 2022 | Blogs
The CISOs Report finds CISOs are prioritizing Zero Trust and partner risk management to mitigate critical security challenges.June 1, 2022 | Blogs
NodeZero is the first autonomous penetration testing platform to offer both internal and external pentesting in one self-service platform.May 27, 2022 | Blogs
The Horizon3.ai Attack Team released their VMware Authentication Vulnerability (CVE-2022-22972) Technical Deep Dive.May 24, 2022 | Blogs
XorDdos Is continuing to hunt servers with weak passwords. According to a recent post from Microsoft, there’s been a 254%…May 20, 2022 | Blogs
Horizon3.ai news, including an award nomination, plus cybersecurity updates for education and M&A.May 16, 2022 | Blogs
The Log4Shell RCE vulnerability in Apache Log4j, CVE-2021-44228, dates to 2013 when Log4j 2.0-beta9 was released. An analysis of our…May 10, 2022 | Blogs
It took just two days for a pair of researchers from Horizon3.ai to discover exploits for the new F5 BIG-IP…May 5, 2022 | Blogs
It’s World Password Day, but it’s never a bad time to think about credential security and usage. Credentialed attacks are…