Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 253–258 of 473 results
Are Your Kubernetes Clusters Configured Properly?
Researchers recently discovered some 900,000 Kubernetes clusters that were potentially exposed to malicious scans and data theft during a threat-hunting exercise.
Read More Healthcare Staffing Organization Puts Cybersecurity Best Practices in Place with NodeZero
The director of security engineering at a national healthcare staffing organization found that NodeZero’s a perfect fit for keeping his organization safe.
Read More Former JSOC CTO takes aims at stopping cyberattacks before they happen with Horizon3 AI
SiliconANGLE: 08/30/22 The main reason why security tools are falling short of detecting many malicious activities today is that the actors orchestrate their hacks to resemble valid behavior from the target organization, according to Antani. These would include things like social engineering to obtain valid login credentials and then waiting for one of the owners to reuse a compromised password....
Read More Tech Talk: The Attackers Journey Pt. 6
Noah King, one of Horizon3's front-end developers, is inviting you into his experience as he learns to be an expert at ethical hacking and get his OSCP cert!
Read More Go Hack Yourself: 5 Crazy Ways NodeZero Became Domain Admin
Attackers don't have to "hack in" using zero-day vulnerabilities. Often, attackers log in by chaining together misconfigurations, dangerous product defaults, and exploitable vulnerabilities to harvest and reuse credentials. This session will discuss five real-world attacks that enabled Horizon3.ai to become domain administrator, gain access to sensitive data, take over cloud VPCs, and compromise critical business systems. In most instances no...
Read More An International Look at Cybercrime
Authoritarian regimes have learned in recent years that cybercrime can be a profitable economic enterprise – so much so that they continue to invest substantial resources in large- and small-scale cybercrime.
Read More