Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
October 11, 2022 | Attack Blogs
Introduction The recent FortiOS / FortiProxy / FortiSwitchManager CVE has been reportedly exploited in the wild. We would like to…September 13, 2022 | Customer Stories
Pen testers, vulnerability scanners, and installed agents alert on potential vulnerabilities and breaches. You receive a list, or a notification,…September 12, 2022 | Customer Stories
One of our clients, a leading U.S. hospital and healthcare system, consistently earns high marks for clinical excellence and is…August 31, 2022 | Blogs
Researchers recently discovered some 900,000 Kubernetes clusters that were potentially exposed to malicious scans and data theft during a threat-hunting…August 31, 2022 | Customer Stories
The director of security engineering at a national healthcare staffing organization found that NodeZero’s a perfect fit for keeping his…August 30, 2022 | Webinar Replays
Noah King, one of Horizon3's front-end developers, is inviting you into his experience as he learns to be an expert…August 30, 2022 | Webinar Replays
Attackers don't have to "hack in" using zero-day vulnerabilities. Often, attackers log in by chaining together misconfigurations, dangerous product defaults,…August 29, 2022 | Blogs
Authoritarian regimes have learned in recent years that cybercrime can be a profitable economic enterprise – so much so that…August 25, 2022 | Blogs
NodeZero is a generational leap beyond a traditional pentest – organizations often see that for themselves from the moment they…August 25, 2022 | Webinar Replays
As the industry accelerates toward a threat landscape of attack and defense by algorithm and machine, humans must run at…