Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
LATEST VULNERABILITIES
WEBINAR REPLAY
SEARCH
CATEGORIES
TAGS
CVE-2025-34508: Another File Sharing Application, Another Path Traversal
June 17, 2025
Learn how Horizon3.ai uncovered CVE-2025-34508 in ZendTo, allowing attackers to access sensitive files through a path traversal flaw.
Third-Party Risk Management
June 13, 2025
NodeZero for TPRM: NodeZero proactively secures your supply chain by replacing assumptions with proof. It empowers you to find, fix, and validate third-party risks before they disrupt your business.
Horizon3.ai Raises $100M to Cement Leadership in Autonomous Security
June 12, 2025
Rewriting Cybersecurity Rules. Led by veterans and ethical hackers, Horizon3.ai's NodeZero platform is transforming how organizations defend against threats.
What 7,000+ NodeZero RAT Attempts Show Us About Cyber Security
June 9, 2025
Discover how NodeZero's autonomous RAT operates, why credentials dominate post-exploitation, and what it means for your cyber defense.
Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis
May 29, 2025
Explore how a hard-coded JWT in Cisco IOS XE WLC enables unauthenticated file upload and potential RCE—and how to mitigate it.
CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows
May 22, 2025
Analyze CVE-2025-32756, a Fortinet buffer overflow flaw under active attack, and see how NodeZero can validate exposure now.
Jerome’s Furniture: Compliance to Real Security
Mission: Jerome’s Furniture is committed to providing highquality home furnishings at everyday low prices, treating customers like family, and ensuring transparency, service, honesty, quality, and a family-oriented approach in all interactions. Area of Operation: Jerome’s Furniture operates primarily in Southern California, with multiple showrooms across the region, including locations in San Diego, Los Angeles, Orange…
How Hackers Weaponize Slack: Lessons From Real Slack Dump Attacks
Slack's popularity creates data exfiltration risks. Autonomous pentesting finds hidden vulnerabilities.
From War Room to Board Room: Own the Narrative.
May 19, 2025
Regulatory pressure and shareholder expectations have created a duty to know — and to act. Static pentest reports no longer suffice.
Using NodeZero® to Uncover the Paths Attackers Take, Before They Do
May 2, 2025
Discover how NodeZero emulates real attackers to uncover critical attack paths, escalate access, and deliver proof—fast and autonomously.