Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
April 24, 2025 | Blogs
Discover why Adversarial Exposure Validation (AEV) is essential to any CTEM program. Learn how continuous, automated validation strengthens security, boosts…April 24, 2025 | Research
We are proud to announce that Horizon3.ai has been named a Representative Vendor in the 2025 Gartner® Market Guide for…April 23, 2025 | Webinar Replays
Watch Horizon3.ai PMs demo the latest NodeZero updates—from NodeZero Tripwires™ to NodeZero Insights™, AD cracking, and new external attack techniques.April 10, 2025 | Infographics
Key findings from Horizon3.ai’s Annual Insights Report, powered by NodeZero® data and a survey of 800+ CISOs and IT pros.April 9, 2025 | Attack Blogs, Disclosures
CVE-2025-3248 is a critical code injection vulnerability affecting Langflow, a popular tool used for building out agentic AI workflows. This…April 9, 2025 | Webinar Replays
See how autonomous pentesting with NodeZero helps you find, fix, and verify cyber risks fast—no more waiting weeks for answers.April 7, 2025 | Blogs
Spring updates are here! Explore NodeZero’s latest threat detection, pentest, and insights features—built to stay ahead of attackers.April 2, 2025 | Blogs
Discover hidden cybersecurity risks from our 2025 report. Unfiltered insights on BAS, compliance pitfalls, third-party threats & more.March 27, 2025 | Attack Blogs
CrushFTP auth bypass (CVE-2025-2825) could grant attackers admin access. Learn IoCs & test exposure with NodeZero. Patch now!March 26, 2025 | Research
Insights from 50K+ NodeZero®️ pentests reveal why offensive security is key in 2025. Learn how to move beyond compliance and…