Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    [Raised 38.5 million] Ep.39 The First 100 with Snehal Antani, the Founder of Horizon3.ai

    February 7, 2023
    In this episode, serial entrepreneur Hadi Radwan chats with Snehal Antani, the Founder of Horizon3.ai, a software company that mission is to help companies find and fix attack vectors before attackers can exploit them. Horizon3.ai has raised $38.5 million to date

    Chaining and Reusing Credentials

    February 2, 2023
    Attackers don’t need to hack in – they log in. This is why we believe Credentials are the new RCE. 

    VMware vRealize Log Insight VMSA-2023-0001 Technical Deep Dive

    January 31, 2023
    Introduction The recent VMware VMSA describes four new CVEs affecting VMware vRealize Log Insight, reported by ZDI. Three of these CVEs can be combined to give an attacker remote code execution as root. This vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. We have successfully reproduced this exploit and would like…

    VMware vRealize Log Insight VMSA-2023-0001 IOCs

    January 27, 2023
    Introduction The recent VMware VMSA describes four new CVEs affecting VMware vRealize Log Insight. Three of these CVEs can be combined to give an attacker remote code execution as root. This vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. CVE-2022-31704: VMware vRealize Log Insight broken access control Vulnerability CVE-2022-31711: VMware vRealize…

    ManageEngine CVE-2022-47966 Technical Deep Dive

    January 19, 2023
    Introduction On January 10, 2023, ManageEngine released a security advisory for CVE-2022-47966 (discovered by Khoadha of Viettel Cyber Security) affecting a wide range of products. The vulnerability allows an attacker to gain remote code execution by issuing a HTTP POST request containing a malicious SAML response. This vulnerability is a result of  using an outdated…

    ManageEngine CVE-2022-47966 IOCs

    January 13, 2023
    Introduction The recent ManageEngine CVE-2022-47966 is a pre-authentication remote code execution vulnerability. Depending on the specific ManageEngine product, this vulnerability is exploitable if SAML single-sign-on is enabled or has ever been enabled. ManageEngine products are some of the most widely used across enterprises and perform business functions such as authentication, authorization, and identity management. Given the nature…

    Insight – Horizon3.ai Annual Review Snapshot 2022

    January 8, 2023
    Over the past year, Horizon3.ai pentests revealed cybersecurity vulnerability trends across multiple industry sectors around the globe.

    Regina International Airport Uses NodeZero to Close Gaps, Improve Efficiency

    December 15, 2022
    “...using toolsets like NodeZero, we determined where we have leakage and interaction between networks,” says Manager of Technology at Regina International Airport.

    Get the Most From TrendMicro Apex One EDR with NodeZero

    December 12, 2022
    Learn how you can use NodeZero to get the Most From TrendMicro Apex One EDR, ensuring you stop, alert, log, and detect activity by bad actors.

    Metrics That Matter: An Attacker’s Perspective on Assessing Password Policy

    December 1, 2022
    After compromising a Windows domain controller, one of the actions that NodeZero, our autonomous pentest product, performs is dumping all domain user password hashes from the Active Directory database. This is a common attacker technique, and the resulting dump is highly valuable to attackers. But did you know that this data is a great source…