Resource Center
Subscribe to AlertsWelcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Category:
Tags:
August 10, 2023 | Attack Blogs
Introduction In December 2022, we competed at our first pwn2own. We were able to successfully exploit the Lexmark MC3224i using…August 7, 2023 | Attack Paths
A NodeZero autonomous attack that leveraged two weaknesses to achieve domain compromise in 33 minutes, 9 seconds.August 7, 2023 | Podcasts
Last Watchdog Editor-In-Chief Byron Acohido interviews Horizon3.ai CEO Snehal Antani about advanced pentesting tools and services.August 4, 2023 | Attack Blogs, Disclosures
Summary CVE-2023-39143 is a critical vulnerability we disclosed to PaperCut that affects the widely used PaperCut NG/MF print management software.…July 26, 2023 | Webinar Replays
Art Ocain, Field CISO at Airiam, and Naveen Sunkavally, Chief Architect at Horizon3.ai join forces in this webinar, where you…June 22, 2023 | Webinar Replays
In Horizon3.ai's three years of operation, we have conducted more than 15,000 pentests yielding results for our clients and data…