Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

LATEST VULNERABILITIES

Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-54309

CrushFTP Authentication Bypass Vulnerability
Read More →
Bomb Streamline Icon: https://streamlinehq.com

CVE-2025-53770

Microsoft SharePoint Remote Code Execution (ToolShell) Vulnerability
Read More →

WEBINAR REPLAY

SEARCH

CATEGORIES

TAGS

    Jerome’s Furniture: Compliance to Real Security

    Mission: Jerome’s Furniture is committed to providing highquality home furnishings at everyday low prices, treating customers like family, and ensuring transparency, service, honesty, quality, and a family-oriented approach in all interactions. Area of Operation: Jerome’s Furniture operates primarily in Southern California, with multiple showrooms across the region, including locations in San Diego, Los Angeles, Orange…

    How Hackers Weaponize Slack: Lessons From Real Slack Dump Attacks

    Slack's popularity creates data exfiltration risks. Autonomous pentesting finds hidden vulnerabilities.

    From War Room to Board Room: Own the Narrative.

    May 19, 2025
    Regulatory pressure and shareholder expectations have created a duty to know — and to act. Static pentest reports no longer suffice.

    Using NodeZero® to Uncover the Paths Attackers Take, Before They Do

    May 2, 2025
    Discover how NodeZero emulates real attackers to uncover critical attack paths, escalate access, and deliver proof—fast and autonomously.

    Fireside Chat: Horizon3.ai and Quantum Marine Engineering

    DoD supply chain cyber threats are surging. Learn how CAPT helps suppliers find, fix & verify gaps with scalable, autonomous security testing.

    What Is Pentesting? The Ultimate Guide to Penetration Testing

    April 30, 2025
    Learn how pentesting goes beyond scans to validate real risk, meet compliance, and stay ahead of threats with Horizon3.ai’s ultimate guide.

    The Duty to Know: Why Security Leaders Can’t Afford Ignorance

    April 28, 2025
    Security leaders can’t afford blind spots. Learn why proving security effectiveness is now a must—and how to meet the Duty to Know.

    Demonstrating DORA Resilience in the Legal Sector

    April 24, 2025
    Discover how NodeZero® helps legal firms proactively reduce cyber risk with real-world attack simulation, identifying exploitable gaps and providing actionable insights to strengthen security.

    Why Adversarial Exposure Validation Belongs in Every CTEM Program

    April 24, 2025
    Discover why Adversarial Exposure Validation (AEV) is essential to any CTEM program. Learn how continuous, automated validation strengthens security, boosts red teaming, and proves real-world risk reduction.

    NodeZero® Release Recap: Spring Edition

    Watch Horizon3.ai PMs demo the latest NodeZero updates—from NodeZero Tripwires™ to NodeZero Insights™, AD cracking, and new external attack techniques.