Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
LATEST VULNERABILITIES
WEBINAR REPLAY
SEARCH
CATEGORIES
TAGS
Privileged Credentials Often Bite Back
August 7, 2023
Active Directory Analytics Solution Enables Domain Compromise
CVE-2023-39143: PaperCut Path Traversal/File Upload RCE Vulnerability
August 4, 2023
Summary CVE-2023-39143 is a critical vulnerability we disclosed to PaperCut that affects the widely used PaperCut NG/MF print management software. It affects PaperCut NG/MF running on Windows, prior to version 22.1.3. If you are a user of PaperCut on Windows, and have it exposed to the Internet, we recommend you check out the July 2023…
Airiam and Horizon3.ai Threat Actors Webinar – Attack Simulation
Art Ocain, Field CISO at Airiam, and Naveen Sunkavally, Chief Architect at Horizon3.ai join forces in this webinar, where you will gain an in-depth understanding of threat actors and their tactics through a LIVE attack simulation.
Low-Level Credentials Can Get Big Gains
July 26, 2023
Combining Compromised Credentials Enables Domain Takeover
Veeam CVE Leads to Full Compromise
July 26, 2023
Low-Level Vulnerability Leads to Domain Compromise
You Can’t Manage Risk if You Lack Context
June 29, 2023
Low-Level Vulnerability Leads to Domain Compromise
War Stories from 15K Pentests: With Log4shell, Vulnerable ≠ Exploitable
In Horizon3.ai's three years of operation, we have conducted more than 15,000 pentests yielding results for our clients and data for our engineers. Join our CEO, Snehal Antani, for stories from the trenches. This month we'll take a look at the Log4shell example, and learn about how the distinction between being vulnerable and being exploitable…
INSIGHT – MOVEit Zero-Day Reminds Us Yet Again to Be Diligent in Monitoring Our IT Infrastructure
June 15, 2023
Over the last week, the widely reported critical security flaw in the Progress MOVEit Transfer application (CVE-2023-34362) reminded us yet again to remain vigilant in securing our IT infrastructure from potential cyber threat actors.
MOVEit Transfer CVE-2023-34362 Deep Dive and Indicators of Compromise
June 9, 2023
On May 31, 2023, Progress released a security advisory for their MOVEit Transfer application which detailed a SQL injection leading to remote code execution and urged customers to update to the latest version. The vulnerability, CVE-2023-34362, at the time of release was believed to have been exploited in-the-wild as a 0-day dating back at least…
Clients Want Assessments to Prove Service Efficacy
June 5, 2023
Gartner® recently published a report called, Emerging Tech: Grow Your Security Service Revenue with Cybersecurity Validations. We believe the report provides research from a buyer’s perspective on security services they purchase while offering guidance to MSPs and MSSPs on how to improve retention and upsell rates of the critical services they provide. So, what has…
