INSIGHT – MOVEit Zero-Day Reminds Us Yet Again to Be Diligent in Monitoring Our IT Infrastructure Jun 15, 2023Over the last week, the widely reported critical security flaw in the Progress MOVEit Transfer application (CVE-2023-34362) reminded us yet again to remain vigilant in securing our IT infrastructure from potential cyber threat actors.
Clients Want Assessments to Prove Service Efficacy Jun 5, 2023Gartner® recently published a report called, Emerging Tech: Grow Your Security Service Revenue with Cybersecurity Validations. We believe the report provides research from a buyer’s perspective on security services they purchase while offering guidance to MSPs and MSSPs on how to improve retention and upsell rates of the critical services they provide. So, what has Gartner discovered, and what do they recommend?
CISA’s Ransomware Vulnerability Awareness Pilot: But Is It Enough? May 31, 2023In early 2023, CISA launched their Ransomware Vulnerability Awareness Pilot (RVWP). It’s designed to warn critical infrastructure (CI) entities that their systems have exposed vulnerabilities that may be exploited by ransomware threat actors. The plan is to identify affected systems that may be prevalent in CI networks, then notify operators about potential risk of exploitation. The idea behind this is to enable timely mitigation measures before the damage is done in the context of ransomware attacks.
Hack The Box – Jerry The Jerry machine from the Hack The Box platform nicely illustrates the danger of weak and default credentials.
Writeup for CVE-2023-39143: PaperCut WebDAV Vulnerability Jan 12, 2024Introduction Back in Aug. 2023 we released an advisory for CVE-2023-39143, a critical vulnerability that affects Windows installs of the PaperCut NG/MF print management software. Attackers can exploit this vulnerability to download and delete arbitrary files, and in...
The Elephant In the Room – NTLM Coercion and Understanding Its Impact Jan 9, 2024Since introducing NTLM coercion techniques such as PetitPotam into the NodeZero platform, we frequently have security practitioners request help understanding these techniques and what impact they have to their enterprise. There is a lack of concise resources to...
NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208) Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to 4.4.1 are vulnerable to an unauthenticated remote code execution vulnerability, CVE-2023-43208. If you’re a user of Mirth Connect, you’ll want to upgrade to the latest patch release, 4.4.1, as of this writing.
Horizon3.ai Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022 Jun 6, 2022Business Wire: 06/06/22 Horizon3.ai is proud to announce its NodeZero Autonomous Penetration Testing has won the Best Penetration Test Solution Award from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. Read entire...
Horizon3.ai Offers First External and Internal Autonomous Penetration Testing Platform in One Self-Service Portal Jun 1, 2022Business Wire: 06/01/22 Horizon3.ai, a cybersecurity firm focused on autonomous penetration testing, today announced it has extended the capabilities of its NodeZero platform to include external penetration testing. With this enhancement, Horizon3.ai is the first...
Splunk and Crowdstrike Executive Chris Hill Joins Horizon3.ai to Lead Federal Strategy May 24, 2022Business Wire: 05/23/22 Horizon3.ai, a cybersecurity firm focused on autonomous penetration testing, today announced the appointment of Chris Hill as the Sector Head for Public Sector, Federal. Hill will execute Horizon3.ai’s vision for creating a better, more secure...
21 November Information Security ForumInformation Security Forum7:30 amOmni Boston Hotel at the Seaport
12 December Uncover Kubernetes Security Weaknesses with NodeZero™Uncover Kubernetes Security Weaknesses with NodeZero™1:00 pmZoom Webinar
INSIGHT – MOVEit Zero-Day Reminds Us Yet Again to Be Diligent in Monitoring Our IT Infrastructure Jun 15, 2023Over the last week, the widely reported critical security flaw in the Progress MOVEit Transfer application (CVE-2023-34362) reminded us yet again to remain vigilant in securing our IT infrastructure from potential cyber threat actors.
Clients Want Assessments to Prove Service Efficacy Jun 5, 2023Gartner® recently published a report called, Emerging Tech: Grow Your Security Service Revenue with Cybersecurity Validations. We believe the report provides research from a buyer’s perspective on security services they purchase while offering guidance to MSPs and MSSPs on how to improve retention and upsell rates of the critical services they provide. So, what has Gartner discovered, and what do they recommend?
CISA’s Ransomware Vulnerability Awareness Pilot: But Is It Enough? May 31, 2023In early 2023, CISA launched their Ransomware Vulnerability Awareness Pilot (RVWP). It’s designed to warn critical infrastructure (CI) entities that their systems have exposed vulnerabilities that may be exploited by ransomware threat actors. The plan is to identify affected systems that may be prevalent in CI networks, then notify operators about potential risk of exploitation. The idea behind this is to enable timely mitigation measures before the damage is done in the context of ransomware attacks.
Hack The Box – Jerry The Jerry machine from the Hack The Box platform nicely illustrates the danger of weak and default credentials.
Writeup for CVE-2023-39143: PaperCut WebDAV Vulnerability Jan 12, 2024Introduction Back in Aug. 2023 we released an advisory for CVE-2023-39143, a critical vulnerability that affects Windows installs of the PaperCut NG/MF print management software. Attackers can exploit this vulnerability to download and delete arbitrary files, and in...
The Elephant In the Room – NTLM Coercion and Understanding Its Impact Jan 9, 2024Since introducing NTLM coercion techniques such as PetitPotam into the NodeZero platform, we frequently have security practitioners request help understanding these techniques and what impact they have to their enterprise. There is a lack of concise resources to...
NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208) Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to 4.4.1 are vulnerable to an unauthenticated remote code execution vulnerability, CVE-2023-43208. If you’re a user of Mirth Connect, you’ll want to upgrade to the latest patch release, 4.4.1, as of this writing.
Horizon3.ai Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022 Jun 6, 2022Business Wire: 06/06/22 Horizon3.ai is proud to announce its NodeZero Autonomous Penetration Testing has won the Best Penetration Test Solution Award from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. Read entire...
Horizon3.ai Offers First External and Internal Autonomous Penetration Testing Platform in One Self-Service Portal Jun 1, 2022Business Wire: 06/01/22 Horizon3.ai, a cybersecurity firm focused on autonomous penetration testing, today announced it has extended the capabilities of its NodeZero platform to include external penetration testing. With this enhancement, Horizon3.ai is the first...
Splunk and Crowdstrike Executive Chris Hill Joins Horizon3.ai to Lead Federal Strategy May 24, 2022Business Wire: 05/23/22 Horizon3.ai, a cybersecurity firm focused on autonomous penetration testing, today announced the appointment of Chris Hill as the Sector Head for Public Sector, Federal. Hill will execute Horizon3.ai’s vision for creating a better, more secure...
21 November Information Security ForumInformation Security Forum7:30 amOmni Boston Hotel at the Seaport
12 December Uncover Kubernetes Security Weaknesses with NodeZero™Uncover Kubernetes Security Weaknesses with NodeZero™1:00 pmZoom Webinar