Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

Sangoma FreePBX Authentication Bypass and Remote Code Execution Vulnerabilities
Read More →
Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-55182

React Server Components RCE | Rapid Response
Read More →

SEARCH

CATEGORIES

TAGS

    The FreePBX Rabbit Hole: CVE-2025-66039 and others

    December 11, 2025
    We dive into a new set of FreePBX issues beyond CVE-2025-57819: an authentication bypass in webserver mode (CVE-2025-66039), multiple SQL injections (CVE-2025-61675), and an arbitrary file upload bug leading to remote code execution (CVE-2025-61678). Together, they allow authenticated or unauthenticated attackers to achieve code execution on vulnerable FreePBX instances using risky auth settings. This write-up…

    From Patch Tuesday to Pentest Wednesday®: Proof That Redefined Security for a Manufacturer

    December 10, 2025
    Patch Tuesday is a known event, but attackers are moving faster than ever. For a leading U.S. manufacturer, shifting from simple patching to continuous validation became the key to proving their fixes worked, turning uncertainty into confidence.

    Horizon3.ai is named a Customer’s Choice in the October 2025 Gartner® Peer Insights™ “Voice of the Customer”: Adversarial Exposure Validation report

    December 4, 2025
    Horizon3.ai has been named a Customers’ Choice in the October 2025 Gartner® Peer Insights™ “Voice of the Customer”: Adversarial Exposure Validation report, reflecting strong peer satisfaction and real-world impact.

    Introducing Threat Informed Perspectives: A More Strategic Way to Measure Security Posture

    Threat Informed Perspectives give organizations a structured, attacker-aligned way to measure exposure, track real security improvement, and validate remediation over time using continuous, evidence-driven insights from NodeZero.

    Customer Data Handling Factsheet

    November 25, 2025
    At Horizon3.ai, transparency and security go hand in hand. The NodeZero® Offensive Security Platform protects your data during every test — encrypting communications, limiting retention, and ensuring no sensitive data leaves your environment. Download the factsheet to see how our strict controls safeguard customer information from launch to teardown.

    Endpoint Detection and Response: What It Is and How to Know Yours Is Working

    November 24, 2025
    EDR tools offer visibility, but visibility isn’t protection. Learn why credential-driven attacks often bypass EDR and how NodeZero validates real-world detection, blocking, and effectiveness across your endpoints.

    Supercharging Enterprise AI with Real-World Exploitability Data: The NodeZero MCP Server Advantage

    Learn how the NodeZero MCP Server supercharges enterprise AI ecosystems with attacker-validated exploitability data, continuous validation, and automated security workflows.

    Prioritize What’s Proven: The NodeZero® Approach to Risk‑Based Vulnerability Management

    November 18, 2025
    Horizon3.ai’s NodeZero® redefines Risk-Based Vulnerability Management by connecting exploitability, business context, and attacker behavior. With new capabilities for High-Value Targeting, Advanced Data Pilfering, Threat Actor Intelligence, and Vulnerability Risk Intelligence, NodeZero moves vulnerability management from noise to proof—helping security teams prioritize, fix, and verify what truly matters.

    N-able N-central: From N-days to 0-days

    Horizon3.ai discovered two critical vulnerabilities in N-able N-central — CVE-2025-9316 and CVE-2025-11700 — that can be chained to leak credentials and fully compromise the appliance. This in-depth analysis details how the flaws were found, exploited, responsibly disclosed, and patched in version 2025.4, turning N-days into true 0-days.

    Hack The Box – Retro

    November 10, 2025
    NodeZero® autonomously solved Hack The Box Retro in just 11 minutes, chaining SMB guest access and weak credentials into an ADCS privilege escalation. This demonstration highlights how autonomous pentesting uncovers exploit chains and validates real attack paths, proving Horizon3.ai’s commitment to evidence-based, attacker-validated security.