Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
October 13, 2022 | Attack Blogs
Fortinet recently patched a critical authentication bypass vulnerability in their FortiOS, FortiProxy, and FortiProxySwitchManager projects (CVE-2022-40684). This vulnerability gives an…October 13, 2022 | Blogs
Zero Trust. Everyone’s talking about it, but what does it truly mean, and how can you prove that your organization…October 13, 2022 | Webinar Replays
Putting Your Security to the Test with NodeZero with Anthony Pillitiere and Clayton Dillard / CEO Legion Cyberworks.October 11, 2022 | Attack Blogs
Introduction The recent FortiOS / FortiProxy / FortiSwitchManager CVE has been reportedly exploited in the wild. We would like to…September 13, 2022 | Customer Stories
Pen testers, vulnerability scanners, and installed agents alert on potential vulnerabilities and breaches. You receive a list, or a notification,…September 12, 2022 | Customer Stories
One of our clients, a leading U.S. hospital and healthcare system, consistently earns high marks for clinical excellence and is…August 31, 2022 | Blogs
Researchers recently discovered some 900,000 Kubernetes clusters that were potentially exposed to malicious scans and data theft during a threat-hunting…August 31, 2022 | Customer Stories
The director of security engineering at a national healthcare staffing organization found that NodeZero’s a perfect fit for keeping his…August 30, 2022 | Webinar Replays
Noah King, one of Horizon3's front-end developers, is inviting you into his experience as he learns to be an expert…August 30, 2022 | Webinar Replays
Attackers don't have to "hack in" using zero-day vulnerabilities. Often, attackers log in by chaining together misconfigurations, dangerous product defaults,…