Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 331–336 of 473 results
Horizon3.ai Expands NodeZero to Include External Autonomous Pentesting
NodeZero is the first autonomous penetration testing platform to offer both internal and external pentesting in one self-service platform.
Read More FBI Warns About Stolen University Credentials Up For Sale by Russian Crooks
FOSSBYTES: 05/28/22 The Federal Bureau of Investigation (FBI) has reported alarming news of Russian crooks selling network credentials and virtual private networks for the US universities and colleges in criminal marketplaces. Read the entire article here
Read More VMware Authentication Bypass POC
SANS Daily Network Security Podcast: 05/27/22 SANS podcast on Horizon3.ai’s red team’s findings. Read the entire article here
Read More Exploit code to hack VMware products is publicly disclosed. PoC for CVE-2022–22972
Medium: 05/27/22 This PoC was published by researchers at security firm Horizon3.ai, in conjunction with technical analysis, after VMware released corresponding updates: “This script can be used by circumventing authentication in vRealize Automation,” the researchers report.. Read the entire article here
Read More Exploitation of VMware Vulnerability Imminent Following Release of PoC
SecurityWeek: 05/27/22 Penetration testing company Horizon3.ai on Thursday published a technical deep dive for CVE-2022-22972 and made public a PoC exploit. VMware has updated its initial advisory to inform customers about the availability of a PoC, which further increases the chances of exploitation. Read the entire article here
Read More Stolen university credentials up for sale by Russian crooks, FBI warns
The Register: 05/27/22 As the majority of colleges in the US, especially ones who are not focused on protecting the intellectual property of their research institutes, have neither the staff nor the budget to implement next-generation cyber tools to combat next generation cyber-attacks, the effort to payoff is several tiers lower than any other industry as a whole. Read the...
Read More