Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
June 17, 2024 | Blogs
Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability…June 14, 2024 | Attack Blogs, Disclosures
This post walks through the vulnerabilities we disclosed affecting Gradio, and our work with Hugging Face to harden the Spaces…June 12, 2024 | Attack Blogs
Introduction Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centralized management of devices within an…June 10, 2024 | Customer Stories
NodeZero helps JTI Cybersecurity scale by automating penetration testing, finding vulnerabilities, and enhancing client security efficiently and effectively.June 4, 2024 | Attack Blogs
Introduction Our last blog post on the FortiClient EMS SQL injection vulnerability, CVE-2023-48788, as it turns out only worked on…May 28, 2024 | Attack Blogs, Disclosures
In November of 2023, preparing for a call for papers, I attempted to investigate the FortiSIEM patch for CVE-2023-34992. I…May 20, 2024 | Attack Paths
As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a…May 20, 2024 | Attack Blogs, Disclosures
In early 2023, given some early success in auditing Fortinet appliances, I continued the effort and landed upon the Fortinet…May 16, 2024 | Webinar Replays
In this webinar. Horizon3.ai cybersecurity expert Brad Hong covers our new Rapid Response service.