Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
LATEST VULNERABILITIES
WEBINAR REPLAY
SEARCH
CATEGORIES
TAGS
Future-Proofing Cities: LYT’s Story
July 19, 2024
As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient.
Fireside Chat: Horizon3.ai and Komori
Komori America's Director of IT, Andy Katz, joins Horizon3.ai's Principal Security SME, Stephen Gates, to discuss how Andy's adaptation of IT technology has dramatically changed over time, the greatest cyber threats to Komori and his firsthand experiences, and why Komori selected #NodeZero to help secure their environments, including some of Andy's initial observations.
Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action
July 10, 2024
How Horizon3.ai's Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how and where the at-risk software is deployed in your environment. To address the need to find what’s exploitable, Horizon3.ai developed and recently unveiled…
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
June 17, 2024
Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security weaknesses strategically.
Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces
June 14, 2024
This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces platform after a recently reported potential breach.
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability
Introduction Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centralized management of devices within an organization. On May 24, 2024, ZDI and Ivanti released an advisory describing a SQL injection resulting in remote code execution with a CVSS score of 9.8. In this post we will detail the internal workings…
The Critical Role of Autonomous Penetration Testing in Strengthening Defense in Depth
June 10, 2024
NodeZero helps JTI Cybersecurity scale by automating penetration testing, finding vulnerabilities, and enhancing client security efficiently and effectively.
Fireside Chat: Horizon3.ai and LYT.
DoD supply chain cyber threats are surging. Learn how CAPT helps suppliers find, fix & verify gaps with scalable, autonomous security testing.
CVE-2023-48788: Revisiting Fortinet FortiClient EMS to Exploit 7.2.X
Introduction Our last blog post on the FortiClient EMS SQL injection vulnerability, CVE-2023-48788, as it turns out only worked on 7.0.x versions. This article will discuss the differences in exploitation between FortiClient EMS's two mainline versions: 7.0.x and 7.2.x. When writing exploits for different versions of vulnerable software, the differences in the exploit are usually…
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive
In November of 2023, preparing for a call for papers, I attempted to investigate the FortiSIEM patch for CVE-2023-34992. I kindly inquired with the PSIRT if I could have access to the most recent versions to some of their appliances to validate the patches, to which they declined. Acquiring access a different way, I eventually…
