Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 193–198 of 473 results
Russian Software Found in Smartphone App Used by CDC and U.S. Army
ClearanceJobs: 11/14/22 “After being branded as an American company, the revelation of Pushwoosh being a Russian-originated software firm comes as yet another embarrassment to Apple and Google in the privacy domain,” explained Taylor Ellis, customer threat analyst at Horizon3ai. Read the entire article here
Read More Cloud Security Excellence
Horizon3.ai Named Winner of TMC 2022 Cloud Security Excellence Awards
Read More Cloud Security Innovation of the Year
Named Finalist by SDC Awards a for Cloud Security Innovation of the Year
Read More Penetration tester Horizon3.ai identifies Fortinet exploit source, assists those checking for potential attacks
SiliconANGLE: 11/02/22 “We want to be to have a tool that can be used to exploit our customer system safely to prove that they’re vulnerable, so then they can go and fix it,” said James Horseman (pictured, right), exploit developer at Horizon3.ai. Read the entire article here
Read More Verifying Credentialed Access to Your Hybrid Cloud Sprawl Matters More Than Ever
Verifying credentialed access to your hybrid cloud sprawl matters more than ever. See example attack paths to understand risks to AWS cloud.
Read More Verifying Credentialed Access to Your Hybrid Cloud Sprawl Matters More Than Ever
Security Boulevard: 11/01/22 Everyone is talking about infrastructure and environments, the cost, the speed – but core to all that incredible capability remains our credentials. Read the entire article here
Read More