Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-24813

Apache Tomcat Path Equivalence Vulnerability
Read More →

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    Strengthening Cloud Security: A Comprehensive Approach

    In the evolving landscape of cloud and hybrid environments, robust security measures are more critical than ever. In this webinar Brad Hong, CISSP, explores autonomous pentesting methodologies and strategies that can help your organization take a more efficient and comprehensive approach to securing your entire digital infrastructure that embraces multiple cloud vendors.

    NodeZero Cloud Pentesting

    July 29, 2024
    NodeZero Cloud Pentesting offers autonomous, comprehensive pentests for cloud and hybrid environments, validating security policies and assessing risks from internal and external perspectives. It rigorously tests cloud security controls in AWS and Microsoft Azure Entra ID, identifying vulnerabilities, misconfigurations, and potential attack paths. This approach ensures thorough validation of security defenses and highlights connections between…

    NodeZero Tripwires

    July 29, 2024
    NodeZero Tripwires™ enhances threat detection and response by autonomously deploying decoys and monitoring for unauthorized access in high-risk areas. Integrated with NodeZero’s pentesting, it provides real-time alerts, minimizes false positives, and supports various tripwire types like AWS API keys and Windows Suspicious Process Monitors. Alerts are seamlessly integrated into existing security workflows, offering early detection…

    NodeZero Fact Sheet

    July 29, 2024
    The NodeZero platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and fix them, and helping you immediately verify that your fixes are effective.

    NodeZero Capability Statement

    July 29, 2024
    The NodeZero platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and fix them, and helping you immediately verify that your fixes are effective.

    Future-Proofing Cities: LYT’s Story

    July 19, 2024
    As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient.

    Fireside Chat: Horizon3.ai and Komori

    Komori America's Director of IT, Andy Katz, joins Horizon3.ai's Principal Security SME, Stephen Gates, to discuss how Andy's adaptation of IT technology has dramatically changed over time, the greatest cyber threats to Komori and his firsthand experiences, and why Komori selected #NodeZero to help secure their environments, including some of Andy's initial observations.

    Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action

    July 10, 2024
    How Horizon3.ai's Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how and where the at-risk software is deployed in your environment. To address the need to find what’s exploitable, Horizon3.ai developed and recently unveiled…

    Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing

    June 17, 2024
    Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security weaknesses strategically.

    Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces

    June 14, 2024
    This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach.