Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    CVE-2024-23897: Check Critical Jenkins Arbitrary File Leak Vulnerability Now!

    January 30, 2024
    On 24 January 2024, the Jenkins team issued a security advisory disclosing a critical vulnerability that affects the Jenkins CI/CD tool. Jenkins is a Java-based open-source automation server run by over 1 million users that helps developers build, test and deploy applications, enabling continuous integration and continuous delivery. The critical vulnerability is tracked as CVE-2024-23897…

    CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability

    January 29, 2024
    CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability.

    CVE-2024-0204: Check Critical Fortra GoAnywhere MFT Authentication Bypass with NodeZero™️ Now!

    January 24, 2024
    On 22 January, Fortra issued an advisory stating that versions of its GoAnywhere Managed File Transfer (MFT) product suffer from an authentication bypass vulnerability.

    Shifting the Focus to Exploitability in CTEM and ASM

    January 24, 2024
    The Exploitable Attack Surface Keeps Expanding: Discover and Remediate Exploitable Vulnerabilities with NodeZero

    NodeZero Updated With Attack Content for Critical Confluence RCE

    January 23, 2024
    On 16 January, Atlassian released a security advisory concerning CVE-2023-22527 that affects vulnerable out-of-date versions of Confluence Data Center and Server.

    CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive

    January 23, 2024
    On January 22, 2024 Fortra posted a security advisory for their GoAnywhere MFT product. This advisory details an authentication bypass vulnerability, CVE-2024-0204, that allows an unauthenticated attacker to create an administrative user for the application. Customers were made aware of the issue by an internal security advisory post and patch made available on December 4,…

    Securing the Move: Cyber Resilience in the Transportation and Supply Chain Industry

    January 23, 2024
    Cyber protection is crucial for the transportation industry and the supply chain because it ensures the seamless flow of goods, prevents disruptions, and preserves the integrity of critical data essential for global commerce.

    Understanding the Actively-Exploited Ivanti CVE’s

    January 22, 2024
    Two recent Ivanti CVEs are being actively exploited by suspected nation-state threat actors.

    Five Key Outcomes of Continuous Security Assessments in Manufacturing

    January 17, 2024
    Manufacturers face an unprecedented array of challenges, from fierce competition to rapid technological advancements. Amid these shifts, ransomware threats have evolved into an imminent danger that can cripple manufacturers.

    A Preemptive Approach to Defeat Ransomware in Healthcare

    January 17, 2024
    Healthcare organizations recognize they need a preemptive approach to help them discover their truly exploitable vulnerabilities, show them how to fix the issues at hand, then verify their fix worked. Discover the facts about how NodeZero is redefining healthcare security in our comprehensive whitepaper.