Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    Product Updates from our CTO

    August 27, 2021
    The engineering team has been working tirelessly to improve the "what to wow" user experience, add more attack content, add indicators of best practices and improve analytical insights. Improving our "what to wow" user experience – In security, there are two types of findings: critical problems that require you skip lunch, or cancel plans with…
    Impacts tab in NodeZero

    Hack the Box – Blue

    August 27, 2021
    NodeZero exploited EternalBlue on HTB’s Blue machine to gain system access and dump credentials, showing the risk of unpatched SMB vulnerabilities.

    Compliance In Security: Go from Compliant to Secure

    August 17, 2021
    Learn why regulatory compliance is not enough for true cybersecurity. Discover how continuous automated pentesting and network segmentation help you move beyond check-the-box security.

    Be Open to Be Wow’d

    July 29, 2021
    Being a #learnitall, Lesson 1: Be Open to Be Wow’d Most of the startup advice out there is pretty clear: get feedback early and often. Customer input is invaluable to delivering iter0, your MVP, feature releases that matter, bug fixes, utility and simplicity. In Customer Success, a lot of the job is review and advise so…
    Emoji making a surprised face

    Tech Talk: Compliance in Security

    In the world of network security, compliance is the bare minimum. Compliance is locking your door, but what about your windows?
    Compliance in Security Tech Talk

    CVE-2021-27927: CSRF to RCE Chain in Zabbix

    March 8, 2021
    Zabbix is an enterprise IT network and application monitoring solution. In a routine review of its source code, we discovered a CSRF (cross-site request forgery) vulnerability in the authentication component of the Zabbix UI. Using this vulnerability, an unauthenticated attacker can take over the Zabbix administrator's account if the attacker can persuade the Zabbix administrator…

    POC CVE-2021-21972

    February 24, 2021
    Write the file supplied in the --file argument to the location specified in the --path argument. The file will be written in the context of the vsphere-ui user. If the target is vulnerable, but the exploit fails, it is likely that the vsphere-ui user does not have permissions to write to the specified path.
    Proof of Concept Exploit

    Purple Teams

    February 23, 2021
    Purple teaming is the result of collaboration, communication and sharing of information between a red team and a blue team in an effort to improve the overall security posture of an organization. How organizations comprise these components may vary, but for context, a Red team is the offensive security team. They are trained in the…
    Purple board game piece between a line of blue pieces and a line of red pieces

    CVE-2020-35700: Exploiting a Second-Order SQL Injection in LibreNMS < 21.1.0

    February 7, 2021
    LibreNMS is an open source solution for network monitoring based on PHP, MySQL and SNMP. While reviewing its source code, we discovered a second-order SQL injection vulnerability, CVE-2020-35700, in the Dashboard feature. This vulnerability is exploitable by any authenticated user inside LibreNMS. The vulnerability is fixed in LibreNMS 21.1.0.

    Unauthenticated XSS to Remote Code Execution Chain in Mautic < 3.2.4

    January 24, 2021
    Mautic is widely used open source software for marketing automation. While researching the application and its source code on Github, we discovered an attack chain whereby an unauthenticated attacker could gain remote code execution privileges on the server hosting Mautic by abusing a stored XSS vulnerability. The issues raised in this post, CVE-2020-35124 and CVE-2020-35125,…