Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-49844

Redis Lua Use-After-Free Vulnerability | Critical RCE Risk
Read More →
Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-61882

Oracle E-Business Suite Vulnerability | Active Exploitation
Read More →

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    Achieving FedRAMP® High: What It Means and Why It Matters

    June 23, 2025
    NodeZero Federal™️ is now FedRAMP High Authorized—bringing trusted, autonomous pentesting to high-impact federal and compliance-driven environments.

    What is Offensive Security?

    June 20, 2025
    Explore the evolution, tools, and tactics of offensive security—from early pentests to modern adversary emulation and Zero Trust validation.

    CVE-2025-34508: Another File Sharing Application, Another Path Traversal

    June 17, 2025
    Learn how Horizon3.ai uncovered CVE-2025-34508 in ZendTo, allowing attackers to access sensitive files through a path traversal flaw.

    Third-Party Risk Management

    June 13, 2025
    NodeZero for TPRM: NodeZero proactively secures your supply chain by replacing assumptions with proof. It empowers you to find, fix, and validate third-party risks before they disrupt your business.

    Horizon3.ai Raises $100M to Cement Leadership in Autonomous Security

    June 12, 2025
    Rewriting Cybersecurity Rules. Led by veterans and ethical hackers, Horizon3.ai's NodeZero platform is transforming how organizations defend against threats.

    What 7,000+ NodeZero RAT Attempts Show Us About Cyber Security

    June 9, 2025
    Discover how NodeZero's autonomous RAT operates, why credentials dominate post-exploitation, and what it means for your cyber defense.

    Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis

    May 29, 2025
    Explore how a hard-coded JWT in Cisco IOS XE WLC enables unauthenticated file upload and potential RCE—and how to mitigate it.

    CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows

    May 22, 2025
    Analyze CVE-2025-32756, a Fortinet buffer overflow flaw under active attack, and see how NodeZero can validate exposure now.

    Jerome’s Furniture: Compliance to Real Security

    Mission: Jerome’s Furniture is committed to providing highquality home furnishings at everyday low prices, treating customers like family, and ensuring transparency, service, honesty, quality, and a family-oriented approach in all interactions. Area of Operation: Jerome’s Furniture operates primarily in Southern California, with multiple showrooms across the region, including locations in San Diego, Los Angeles, Orange…

    How Hackers Weaponize Slack: Lessons From Real Slack Dump Attacks

    Slack's popularity creates data exfiltration risks. Autonomous pentesting finds hidden vulnerabilities.