Enterprise Leadership
SEARCH
CATEGORIES
TAGS
Healthcare Org Data Breach Impacts 2 Million Users
June 9, 2022
Shields Health Care Group, Inc. reported this week that it is investigating a data breach which may have impacted 56 healthcare facilities and the patients of those facilities.
Roundup: University Credentials on the Dark Web and More
June 3, 2022
University credentials being sold on the dark web and used against individuals or the institution itself in subsequent cyberattacks.
The CISOs Report Identifies Current Industry Challenges
June 2, 2022
The CISOs Report finds CISOs are prioritizing Zero Trust and partner risk management to mitigate critical security challenges.
Roundup: VMware Vulnerability Deep Dive and More
May 27, 2022
The Horizon3.ai Attack Team released their VMware Authentication Vulnerability (CVE-2022-22972) Technical Deep Dive.
Healthcare Faces an Aggressive Threat Landscape – How To Remediate It With Node Zero
May 25, 2022
Podcast Channel of AST Cybersecurity: 05/25/22. Horizon3.ai CEO and co-founder Snehal Antani joins Ravi Das to discuss the cybersecurity challenges of the healthcare industry.
XorDDos sees significant spike in activity
May 24, 2022
XorDdos Is continuing to hunt servers with weak passwords. According to a recent post from Microsoft, there’s been a 254% increase in activity from XorDdos – an eight-year-old network of infected Linux machines used for DDoS attacks.
Roundup: Awards, Education and M&A Cybersecurity
May 20, 2022
Horizon3.ai news, including an award nomination, plus cybersecurity updates for education and M&A.
World Password Day: Credentialed attacks by the numbers
May 5, 2022
It’s World Password Day, but it’s never a bad time to think about credential security and usage. Credentialed attacks are the most popular means of entry into any digital infrastructure, and remain the easiest method of reconnaissance and privilege escalation for bad actors. With some of the most sophisticated open-source attack tools to date, it’s…
“And Then, My EDR Just Watched It Happen”
April 18, 2022
Learn how NodeZero empowers customers to run continuous penetration tests to find vulnerabilities from an attacker’s perspective, to verify fixes after remediation, and hold the EDR and the rest of the security stack accountable for delivering on their capabilities as designed.
Misreporting Tools Leave Servers Vulnerable for 18 Months
April 6, 2022
Teaching hospital insisted on false positive when NodeZero exploited a critical but year-old vulnerability in under one day, but...