Enterprise Leadership

SEARCH

CATEGORIES

TAGS

    Healthcare Org Data Breach Impacts 2 Million Users

    June 9, 2022
    Shields Health Care Group, Inc. reported this week that it is investigating a data breach which may have impacted 56 healthcare facilities and the patients of those facilities.

    Roundup: University Credentials on the Dark Web and More

    June 3, 2022
    University credentials being sold on the dark web and used against individuals or the institution itself in subsequent cyberattacks.

    The CISOs Report Identifies Current Industry Challenges

    June 2, 2022
    The CISOs Report finds CISOs are prioritizing Zero Trust and partner risk management to mitigate critical security challenges.

    Roundup: VMware Vulnerability Deep Dive and More

    May 27, 2022
    The Horizon3.ai Attack Team released their VMware Authentication Vulnerability (CVE-2022-22972) Technical Deep Dive.

    Healthcare Faces an Aggressive Threat Landscape – How To Remediate It With Node Zero

    May 25, 2022
    Podcast Channel of AST Cybersecurity: 05/25/22. Horizon3.ai CEO and co-founder Snehal Antani joins Ravi Das to discuss the cybersecurity challenges of the healthcare industry.

    XorDDos sees significant spike in activity

    May 24, 2022
    XorDdos Is continuing to hunt servers with weak passwords. According to a recent post from Microsoft, there’s been a 254% increase in activity from XorDdos – an eight-year-old network of infected Linux machines used for DDoS attacks.

    Roundup: Awards, Education and M&A Cybersecurity

    May 20, 2022
    Horizon3.ai news, including an award nomination, plus cybersecurity updates for education and M&A.

    World Password Day: Credentialed attacks by the numbers

    May 5, 2022
    It’s World Password Day, but it’s never a bad time to think about credential security and usage. Credentialed attacks are the most popular means of entry into any digital infrastructure, and remain the easiest method of reconnaissance and privilege escalation for bad actors. With some of the most sophisticated open-source attack tools to date, it’s…
    Wall of Keys - World Password Day

    “And Then, My EDR Just Watched It Happen”

    April 18, 2022
    Learn how NodeZero empowers customers to run continuous penetration tests to find vulnerabilities from an attacker’s perspective, to verify fixes after remediation, and hold the EDR and the rest of the security stack accountable for delivering on their capabilities as designed.
    Security guard on his phone

    Misreporting Tools Leave Servers Vulnerable for 18 Months

    April 6, 2022
    Teaching hospital insisted on false positive when NodeZero exploited a critical but year-old vulnerability in under one day, but...
    Misreporting Tools Leave Servers Vulnerable for 18 Months