Resource Center
Subscribe to AlertsWelcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Category:
Tags:
February 8, 2024 | Webinar Replays
Horizon3.ai Principal Security SME Stephen Gates and Moravian University Director of Information Security James Beers discuss: - How James measures…February 7, 2024 | Factsheets
Horizon3.ai introduces a groundbreaking test type in its NodeZero platform: the Phishing Impact test. It delivers tangible insights into the…February 6, 2024 | Attack Blogs
Introduction Memory safety issues have plagued the software industry for decades. The Cybersecurity & Infrastructure Security Agency (CISA) has been…February 5, 2024 | Blogs
On 22 January, Ivanti published an advisory stating that they discovered two new, high-severity vulnerabilities (CVE-2024-21888 and CVE-2024-21893) after researching…February 5, 2024 | Blogs
“Who cares that the intern was phished during our phishing campaign? It’s an intern, they don't have access to anything…January 30, 2024 | Blogs
On 24 January 2024, the Jenkins team issued a security advisory disclosing a critical vulnerability that affects the Jenkins CI/CD…January 29, 2024 | Attack Blogs
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability.January 24, 2024 | Blogs
On 22 January, Fortra issued an advisory stating that versions of its GoAnywhere Managed File Transfer (MFT) product suffer from…January 24, 2024 | Whitepapers
The Exploitable Attack Surface Keeps Expanding: Discover and Remediate Exploitable Vulnerabilities with NodeZero