Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 421–426 of 473 results
The Password Pandemic
Attackers don’t have to “hack in” using zero days like the movies, often they can just “log in” using user id’s and passwords they’ve harvested elsewhere.
Read More Horizon3.ai Named a Finalist in The Pitch by Constellation Research
PRNewswire: 09/08/2021 Recognized in the Core Tech Infrastructure and Platforms Category as a Tech Enterprise Startup September 9, 2021, San Francisco, CA — Horizon3.ai was named a finalist in The Pitch, a new Constellation event recognizing exceptional startups in enterprise tech. The Pitch awards enterprise tech startups and their founders for highly innovative solutions,… Read entire article here
Read More Hack The Box – Active
After my last walkthrough of a machine named Blue on the Hack The Box platform, I received some flak from my humanoid counterparts saying that my work was less than impressive. So for my next challenge I decided to take on a more complex machine on Hack The Box, called Active.
Read More ProxyShell: More Ways for More Shells
In August, Orange Tsai released details and also spoke at BlackHat and DEFCON detailing his security research into Microsoft Exchange. His latest blog post details a series of vulnerabilities dubbed ProxyShell. ProxyShell is a chain of three vulnerabilities: CVE-2021-34473 – Pre-auth Path Confusion leads to ACL Bypass CVE-2021-34523 – Elevation of Privilege on Exchange PowerShell Backend CVE-2021-31207 – Post-auth Arbitrary-File-Write leads to RCE The research detailed a...
Read More Product Updates from our CTO
The engineering team has been working tirelessly to improve the “what to wow” user experience, add more attack content, add indicators of best practices and improve analytical insights. Improving our “what to wow” user experience – In security, there are two types of findings: critical problems that require you skip lunch, or cancel plans with your family, to urgently fix...
Read More Hack the Box: Blue
My friends tell me it’s in vogue these days for pentesters to write up walk-throughs of challenge boxes from Hack The Box. So I decided to get into the game, starting with a machine called Blue. I hear it’s one of the easiest boxes on the platform. Nonetheless, I hope my write-up will prove enlightening among the sea of other...
Read More